Suggested Topics within your search.
Suggested Topics within your search.
-
1501
An anonymous authentication protocol for vehicle to grid based on elliptic curve cryptography
Published 2025-08-01“…Once these data are leaked, the privacy and security of users will be threatened. …”
Get full text
Article -
1502
The Legal Challenges of Implementing AI in Emergency Departments
Published 2024-04-01“…Additionally, AI systems used in healthcare must be designed with robust security measures to prevent data breaches and ensure the integrity of patient information (1). …”
Get full text
Article -
1503
UAVs and Blockchain Synergy: Enabling Secure Reputation-Based Federated Learning in Smart Cities
Published 2024-01-01“…Unmanned aerial vehicles (UAVs) can be used as drones’ edge Intelligence to assist with data collection, training models, and communication over wireless networks. …”
Get full text
Article -
1504
An empirical study on the usage behavior of mobile health management service systems for flight attendants in the digital Age
Published 2025-04-01“…This study deeply explores the use behavior and influencing factors of mobile health management service systems for flight attendants in the context of the "Digital age".MethodsThe study mainly adopted the questionnaire survey method, used SPSS24.0 and AMOS24.0 software for data analysis, and used statistical methods such as factor analysis, regression analysis, and path analysis to verify the effectiveness of the model and explore the relationship between key variables.Results(1) The usage rate of the health management service system among flight attendants is not as high as expected, but the use rate of sports health monitoring applications reached 66.5%, and the daily frequency of use was as high as 25.52%, (2) Perceived ease of use and perceived usefulness have a positive and significant impact on intention to use, (3) Privacy concerns have a positive impact on intention to use Significant negative impact.ConclusionThe study points out that ease of use and usefulness are key factors in attracting flight attendants to use mobile health management service systems. …”
Get full text
Article -
1505
Appropriately Matching Transport Care Units to Patients in Interhospital Transport Care: Implementation Study
Published 2024-12-01“…We introduce a distributed digital health platform, Interfacility Transport Care (ITC)–InfoChain, designed to solve this problem without compromising EHR security or data privacy. ObjectiveThis study aimed to detail the implementation of ITC-InfoChain, a secure, blockchain-based platform designed to enhance real-time data sharing without compromising data privacy or EHR security. …”
Get full text
Article -
1506
Improving the Leakage Rate of Ciphertext-Policy Attribute-Based Encryption for Cloud Computing
Published 2020-01-01“…A Leakage-Resilient Ciphertext-Policy Attribute-based Encryption (LR-CP-ABE) not only supports the fine-grained access control to encrypted data but also guarantees the security of the data under the side-channel attacks. …”
Get full text
Article -
1507
Problematic aspects of IoT cybersecurity standardisation
Published 2025-04-01“…The main problem with IoT devices is related to privacy and security. The administration of large amounts of data for reliable and secure processing is a real challenge. …”
Get full text
Article -
1508
THE IMPACT OF DIGITAL INNOVATION ON E-COMMERCE YOUNG CUSTOMER SATISFACTION IN VIETNAM
Published 2025-01-01“…It investigates key factors influencing user satisfaction employing frameworks such as the Uses and Gratifications Theory (U&G), Technology Acceptance Model (TAM), and the Unified Theory of Acceptance and Use of Technology (UTAUT), including utilitarian, hedonic, technological, and social gratifications, privacy risk, and social influence. …”
Get full text
Article -
1509
Machine Learning in Ambient Assisted Living for Enhanced Elderly Healthcare: A Systematic Literature Review
Published 2025-01-01“…Issues around data privacy, security breaches, and the need for robust privacy-preserving mechanisms are recurrent themes. …”
Get full text
Article -
1510
Graph Split Federated Learning for Distributed Large-Scale AIoT in Smart Cities
Published 2025-01-01“…However, the centralization of sensitive IoT data for ML raises privacy and efficiency concerns. …”
Get full text
Article -
1511
Blockchain and signcryption enabled asynchronous federated learning framework in fog computing
Published 2025-04-01“…Federated learning combines with fog computing to transform data sharing into model sharing, which solves the issues of data isolation and privacy disclosure in fog computing. …”
Get full text
Article -
1512
Optimization of Cross-Border e-Commerce Logistics Supervision System Based on Internet of Things Technology
Published 2021-01-01“…Then, functions such as swarm intelligence contract, legal anonymous identity authentication, intelligent transaction matching, abnormal data analysis and detection, privacy protection, and traceability are realized under the framework of the supervision system. …”
Get full text
Article -
1513
An Examination of Records Retention and Disposition Policy at Kabale University.
Published 2024“…The study sampled a total of 15 which was collected and used in the analysis. Data was collected through questionnaires and interviews. …”
Get full text
Thesis -
1514
Recommendations for reporting regression-based norms and the development of free-access tools to implement them in practice.
Published 2025-01-01“…Following our recommendations, any user can access the underlying models while data privacy is maintained. This approach ensures broad accessibility and practical application of norms, allowing other researchers to accurately interpret their individual data against such norms.…”
Get full text
Article -
1515
A Cloud User Anomaly Detection Method Based on Mouse Behavior
Published 2019-08-01“… Aiming at the problem of cloud security threat caused by illegal operation of cloud users, this paper proposes a method to detect the abnormal behavior of cloud users by analyzing the mouse operation behavior in user’s work by using deep learning technology under the premise of ensuring the privacy of cloud users. …”
Get full text
Article -
1516
Prevention and Detection Methods for Enhancing Security in an RFID System
Published 2012-08-01“…Low-cost radio frequency identification (RFID) tag is exposed to various security and privacy threats due to computational constraint. This paper proposes the use of both prevention and detection techniques to solve the security and privacy issues. …”
Get full text
Article -
1517
An explainable and federated deep learning framework for skin cancer diagnosis.
Published 2025-01-01“…However, protecting patient data privacy is a major concern in medical research. …”
Get full text
Article -
1518
Federated learning applications in soil spectroscopy
Published 2025-04-01“…Soil spectroscopy has emerged as a key technique for rapid, non-destructive soil property prediction, yet the centralized nature of the training of machine learning models raises concerns around data privacy, accessibility, and transferability. …”
Get full text
Article -
1519
Distributed Training Techniques for Intelligent Model in Space-Based Information Networks
Published 2025-03-01“…In addressing the issues of data distribution heterogeneity, outdated models, and data privacy and security in distributed training of intelligent models, a federated learning architecture of intelligent models was designed based on blockchain technology and applied to space-based information networks. …”
Get full text
Article -
1520
Examine frameworks policies and strategies for effective information governance in healthcare organizations.
Published 2025-01-01“…The majority of healthcare professionals were familiar with and advocated for adherence to regulatory requirements such as HIPAA (33.7%), GDPR (21.3%) and HITECH Act (14.4%), in making data governance much robust. Efforts were also identified in ensuring privacy and confidentiality during the storage, processing and transmission of patient data mostly by deploying methods such as authentication (58.9%), use of secured computers and software (71.2%) and using secure electronic platforms (66.0%) respectively indicating a keen attention for data stewardship and governance. …”
Get full text
Article