-
1
-
2
-
3
An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
Published 2021-01-01Subjects: Get full text
Article -
4
The Utah Population Database. A Model for Linking Medical and Genealogical Records for Population Health Research
Published 2022-05-01Subjects: Get full text
Article -
5
Improving Data Privacy in the Internet of Things by Using Artificial Immune System, in Regard with the Internet Limitations
Published 2022-03-01Subjects: Get full text
Article -
6
Towards Secure Internet of Things: A Coercion-Resistant Attribute-Based Encryption Scheme with Policy Revocation
Published 2025-01-01Subjects: Get full text
Article -
7
-
8
Evaluating the Impact of Face Anonymization Methods on Computer Vision Tasks: A Trade-Off Between Privacy and Utility
Published 2025-01-01Subjects: Get full text
Article -
9
Bridging the Gap in the Adoption of Trustworthy AI in Indian Healthcare: Challenges and Opportunities
Published 2025-01-01Subjects: Get full text
Article -
10
Federated Learning-Based Load Forecasting for Energy Aggregation Service Providers
Published 2025-01-01Subjects: “…energy aggregation service provider|load forecasting|federated learning|data privacy|neural network…”
Get full text
Article -
11
Internet of Things (IoT) technologies: features, development prospects and potential threats
Published 2024-11-01Subjects: Get full text
Article -
12
Mental health apps in India: regulatory landscape and future directions
Published 2025-02-01Subjects: Get full text
Article -
13
Dynamic selectout and voting-based federated learning for enhanced medical image analysis
Published 2025-01-01Subjects: Get full text
Article -
14
Facilitating free travel in the Schengen area—A position paper by the European Association for Biometrics
Published 2023-03-01Subjects: Get full text
Article -
15
Federated Learning Approach for Breast Cancer Detection Based on DCNN
Published 2024-01-01Subjects: Get full text
Article -
16
Harnessing the potential of shared data in a secure, inclusive, and resilient manner via multi-key homomorphic encryption
Published 2024-06-01Subjects: Get full text
Article