-
201
A deep learning-orchestrated garlic routing architecture for secure telesurgery operations in healthcare 4.0
Published 2025-06-01“…ElGamal encryption encrypts the session tags for each telesurgery data relayed between surgeons and the robotic arm. …”
Get full text
Article -
202
Research on Credit Risk Prevention in Supply Chain Finance Driven by Blockchain
Published 2025-01-01“…It will also detail the principles and characteristics of blockchain technology, including its decentralized architecture, encryption algorithms, resistance to tampering, smart contract functionalities, and more. …”
Get full text
Article -
203
The Alliance of BIM and Artificial Intelligence: Challenges for a Reinvented Future – The State of the Art
Published 2025-06-01“…It also highlights the importance of data encryption, AI skills development and a comprehensive training framework within organizations to ensure successful implementation of AI-integrated BIM. …”
Get full text
Article -
204
Microservices for information support of multi-agent systems: methods of collection, monitoring and decision-making
Published 2025-01-01“…The research uses methods of building a microservice architecture to separate and autonomously perform functions such as data collection, monitoring and diagnostics in order to optimize SLA and increase system reliability. To increase the system's resilience to security threats, access control, data encryption, and anomaly analysis stages have been added to the algorithms. …”
Get full text
Article -
205
AHA: Design and Evaluation of Compute-Intensive Hardware Accelerators for AMD-Xilinx Zynq SoCs Using HLS IP Flow
Published 2025-05-01“…The increasing complexity of algorithms in embedded applications has amplified the demand for high-performance computing. …”
Get full text
Article -
206
CareNexus: Integrated solutions for Healthcare Communication
Published 2025-05-01“…A secure authentication based on multiple factors and the use of encryption algorithms, an interface based on different user roles and a prediction system based on model training had been implemented. …”
Get full text
Article -
207
Blockchain Approach for Healthcare Using Fog Topology and Lightweight Consensus
Published 2025-01-01“…The architecture and algorithms for signature generation, encryption, emergency state actions and consensus are developed and evaluated through extensive simulations using the NS3 toolkit.Results: The simulation results validate the effectiveness of the proposed approach in improving healthcare IoT systems. …”
Get full text
Article -
208
BS-SCRM: a novel approach to secure wireless sensor networks via blockchain and swarm intelligence techniques
Published 2024-04-01“…The proposed BS-SCRM method is structured in two phases: (1) an enhanced cluster head (CH) election utilizing an elite strategy-enhanced Whale Optimization Algorithm (WOA) that considers node energy and proximity to the base station, and (2) a secure data on-chain phase where blockchain comes into play, encrypting and validating cluster data to safeguard integrity and prevent tampering. …”
Get full text
Article -
209
A systematic review of data privacy in Mobility as a Service (MaaS)
Published 2025-05-01“…Using the PRISMA framework, a comprehensive literature search across Web of Science, Elsevier, and IEEE Xplore databases resulted in the selection of 32 studies for detailed analysis.The review is structured around three main themes: (1) Privacy-Preserving Techniques, including anonymization strategies (k-anonymity, differential privacy, obfuscation), encryption methods (blockchain, cryptographic protocols), federated learning for decentralized data processing, and advanced algorithms for optimizing privacy budgets and balancing utility-privacy trade-offs; (2) User Trust and Privacy Perceptions, highlighting that trust in service providers is essential for MaaS adoption, privacy concerns may impact adoption but do not necessarily prevent it (the “privacy paradox”), and awareness of data misuse affects user trust and willingness to adopt MaaS; and (3) Regulatory Frameworks, focusing on the importance of GDPR compliance to ensure strict data protection through consent and transparency, and embedding privacy-by-design principles within MaaS architectures to safeguard user data from the outset.This review emphasizes the need for a holistic approach, integrating technological innovation, user-centered design, and strong regulatory oversight to effectively address privacy challenges in MaaS. …”
Get full text
Article -
210
A lightweight lattice-based group signcryption authentication scheme for Internet of things
Published 2024-04-01“…In the key generation stage, the improved trapdoor diagonal matrix was designed to optimize the original image sampling algorithm required for key generation and reduce the overall time required for generating a large number of keys. …”
Get full text
Article -
211
A lightweight lattice-based group signcryption authentication scheme for Internet of things
Published 2024-04-01“…In the key generation stage, the improved trapdoor diagonal matrix was designed to optimize the original image sampling algorithm required for key generation and reduce the overall time required for generating a large number of keys. …”
Get full text
Article -
212
Blockchain-enabled verification of medical records using soul-bound tokens and cloud computing
Published 2024-10-01“…Blockchain systems can lower platform costs and determine the optimal allocation of resources across a dispersed network by utilizing deep learning algorithms. …”
Get full text
Article -
213
The application of blockchain with a comparative approach and its impact on risk, flexibility and internal control evaluation
Published 2024-09-01“…In general, the use of blockchain can affect the following: Risk: Blockchain minimizes the possibility of changing and falsifying information by using strong encryption and security algorithms. Also, by using distributed technology, the reliability of data access and visibility increases. …”
Get full text
Article