-
41
Blockchain-enabled verification of medical records using soul-bound tokens and cloud computing
Published 2024-10-01“…Non-transferable Soul-bound tokens (SBTs) can be a safe and unbreakable way to authenticate medical records by generating encrypted code, which allows the user to authenticate a portion of data. …”
Get full text
Article -
42
Secure bio-inspired optimization with intrusion aware on-demand routing in MANETs
Published 2025-07-01“…To resolve this issue, we proposed a novel Secure Bio-Inspired Optimization (Sec-BIO) methodology for routing over MANET. …”
Get full text
Article -
43
Febrile disease modeling and diagnosis system for optimizing medical decisions in resource-scarce settings
Published 2024-12-01Get full text
Article -
44
Data Governance Design for Optimization of Hospital Management Information System (SIM-RS) at ABC Regional Hospital
Published 2025-06-01“…Implementing the Master Patient Index (MPI) reduces duplicate records, while Two-Factor Authentication (2FA) and AES-256 encryption strengthen data security. …”
Get full text
Article -
45
Bi directional sparse attention recurrent autoencoder based intrusion detection for VANET security with tuna swarm optimization
Published 2025-05-01“…The lack of intrusion detection systems, inadequate encryption methods, insecure communication routes, and inadequate authentication processes are some of the technological flaws in VANETs that make smart vehicles vulnerable to attacks. …”
Get full text
Article -
46
A novel integration of Web 3.0 with hybrid chaotic-hippo-optimized Blockchain framework for healthcare 4.0
Published 2024-12-01“…The findings ultimately provide a comprehensive view of the optimized encryption scheme on blockchain technology and the future pathways for secure authentication frameworks in HealthCare 4.0.…”
Get full text
Article -
47
Enhanced Blockchain-based Key Generation using Butterfly Optimization Algorithm for Efficient Data Sharing in Cloud Computing
Published 2023-03-01“…The paradigm imposes encrypted access control, along with specific enhanced access capabilities. …”
Get full text
Article -
48
A hybrid fog-edge computing architecture for real-time health monitoring in IoMT systems with optimized latency and threat resilience
Published 2025-07-01“…The architecture integrates robust security measures, including end-to-end encryption and distributed authentication, to counter rising data breaches and unauthorized access in IoMT networks. …”
Get full text
Article -
49
Deep convolutional neural network based archimedes optimization algorithm for heart disease prediction based on secured IoT enabled health care monitoring system
Published 2025-07-01“…The Matrix-based RSA encryption technology and a blockchain-based data storage concept provide safe data transmission and authorization. …”
Get full text
Article -
50
A novel lightweight hybrid cryptographic framework for secure smart card operations
Published 2025-05-01Get full text
Article -
51
A deep learning based intrusion detection system for CAN vehicle based on combination of triple attention mechanism and GGO algorithm
Published 2025-06-01“…Because the portal of CAN does not have systems of security, like encryption and authentication in order to contend with cyber-attacks, the necessity for a system of intrusion detection for identifying attacks on the portal of CAN is really essential. …”
Get full text
Article -
52
Integrated Protocols to Ensure Security Services in Wireless Sensor Networks
Published 2013-07-01“…Security in WSN demands authentication, confidentiality, integrity, balancing the energy cost, nonreputation, and scalability services. …”
Get full text
Article -
53
Hardware assurance with silicon photonic physical unclonable functions
Published 2024-10-01“…Photonic Physical Unclonable Functions (PUFs) leverage the response from the photonic devices that are prone to inherent physical variations to generate unique and unpredictable signature identifiers which are then utilized by an authentication system for identification or encryption purposes. …”
Get full text
Article -
54
Enhancing Efficiency and Security in MTC Environments: A Novel Strategy for Dynamic Grouping and Streamlined Management
Published 2024-04-01“…Our proposed solution integrates advanced cryptographic methods, including an optimized Authenticated Message Authentication Code (AMAC) and lightweight encryption, sophisticated optimization algorithms for dynamic grouping, and an efficient, lightweight group management protocol. …”
Get full text
Article -
55
Revisiting Leakage-Resilient MACs and Succinctly-Committing AEAD
Published 2025-03-01“… Pseudo-Random Injections (PRIs) have been used in several applications in symmetric-key cryptography, such as in the idealization of Authenticated Encryption with Associated Data (AEAD) schemes, building robust AEAD, and, recently, in converting a committing AEAD scheme into a succinctly committing AEAD scheme. …”
Get full text
Article -
56
Zero Trust Strategies for Cyber-Physical Systems in 6G Networks
Published 2025-03-01“…This study proposes a Zero Trust security framework for 6G-enabled Cyber-Physical Systems (CPS), integrating Adaptive Access Control (AAC), end-to-end encryption, and blockchain to enhance security, scalability, and real-time threat detection. …”
Get full text
Article -
57
A Novel QR Code–Based Solution for Secure Electronic Health Record Transfer in Venous Thromboembolism Home Rehabilitation Management: Algorithm Development and Validation
Published 2025-08-01“…It uses BPE, Avro, and Gzip for optimized data compression and uses ChaCha20 and BLAKE3 for encryption and authentication. …”
Get full text
Article -
58
Enabling Secure and Scalable GDPR-Compliant Blockchain-Based e-KYC With Efficient Redaction
Published 2025-01-01“…Our solution introduces three key innovations: 1) ZK-Rollup-based authentication integrated with sharded blockchain architecture, enabling off-chain proof batching and distributed verification across shards for high-throughput, low-latency validation; 2) adaptive proxy re-encryption to support secure and dynamic customer data portability between host and requesting FIs; and 3) an optimized redactable blockchain protocol using off-chain Chameleon Hash collision generation and threshold cryptography-based key rotation to enable efficient, secure, and verifiable data updates in compliance with GDPR. …”
Get full text
Article -
59
Excitation-mode-selective emission through multiexcitonic states in a double perovskite single crystal
Published 2025-01-01Get full text
Article -
60
Fortifying IoT Infrastructure Using Machine Learning for DDoS Attack within Distributed Computing-based Routing in Networks
Published 2024-06-01“…On the other hand, if we consider the conventional security approaches, these security devices mostly use traditional security protocols such as password encryption and user authentication respectively. The aim of this paper is to analyze the architecture of attack detection that are deployed in the IoT network and correspondingly demonstrate whether their function is to track and follow or even attack subjects. …”
Get full text
Article