Showing 181 - 187 results of 187 for search 'optimal encryption algorithm', query time: 0.06s Refine Results
  1. 181

    Blockchain Approach for Healthcare Using Fog Topology and Lightweight Consensus by Aya Laouamri, Sarra Cherbal, Yacine Mosbah, Chahrazed Benrebbouh, Kamir Kharoubi

    Published 2025-01-01
    “…The architecture and algorithms for signature generation, encryption, emergency state actions and consensus are developed and evaluated through extensive simulations using the NS3 toolkit.Results: The simulation results validate the effectiveness of the proposed approach in improving healthcare IoT systems. …”
    Get full text
    Article
  2. 182

    BS-SCRM: a novel approach to secure wireless sensor networks via blockchain and swarm intelligence techniques by Jing Xiao, Chaoqun Li, Zhigang Li, Jie Zhou

    Published 2024-04-01
    “…The proposed BS-SCRM method is structured in two phases: (1) an enhanced cluster head (CH) election utilizing an elite strategy-enhanced Whale Optimization Algorithm (WOA) that considers node energy and proximity to the base station, and (2) a secure data on-chain phase where blockchain comes into play, encrypting and validating cluster data to safeguard integrity and prevent tampering. …”
    Get full text
    Article
  3. 183

    A systematic review of data privacy in Mobility as a Service (MaaS) by Zineb Garroussi, Antoine Legrain, Sébastien Gambs, Vincent Gautrais, Brunilde Sansò

    Published 2025-05-01
    “…Using the PRISMA framework, a comprehensive literature search across Web of Science, Elsevier, and IEEE Xplore databases resulted in the selection of 32 studies for detailed analysis.The review is structured around three main themes: (1) Privacy-Preserving Techniques, including anonymization strategies (k-anonymity, differential privacy, obfuscation), encryption methods (blockchain, cryptographic protocols), federated learning for decentralized data processing, and advanced algorithms for optimizing privacy budgets and balancing utility-privacy trade-offs; (2) User Trust and Privacy Perceptions, highlighting that trust in service providers is essential for MaaS adoption, privacy concerns may impact adoption but do not necessarily prevent it (the “privacy paradox”), and awareness of data misuse affects user trust and willingness to adopt MaaS; and (3) Regulatory Frameworks, focusing on the importance of GDPR compliance to ensure strict data protection through consent and transparency, and embedding privacy-by-design principles within MaaS architectures to safeguard user data from the outset.This review emphasizes the need for a holistic approach, integrating technological innovation, user-centered design, and strong regulatory oversight to effectively address privacy challenges in MaaS. …”
    Get full text
    Article
  4. 184

    A lightweight lattice-based group signcryption authentication scheme for Internet of things by XU Chuan, AI Xinghao, WANG Shanshan, ZHAO Guofeng, HAN Zhenzhen

    Published 2024-04-01
    “…In the key generation stage, the improved trapdoor diagonal matrix was designed to optimize the original image sampling algorithm required for key generation and reduce the overall time required for generating a large number of keys. …”
    Get full text
    Article
  5. 185

    A lightweight lattice-based group signcryption authentication scheme for Internet of things by XU Chuan, AI Xinghao, WANG Shanshan, ZHAO Guofeng, HAN Zhenzhen

    Published 2024-04-01
    “…In the key generation stage, the improved trapdoor diagonal matrix was designed to optimize the original image sampling algorithm required for key generation and reduce the overall time required for generating a large number of keys. …”
    Get full text
    Article
  6. 186

    Blockchain-enabled verification of medical records using soul-bound tokens and cloud computing by Puneeta Singh, Shrddha Sagar, Sofia Singh, Haya Mesfer Alshahrani, Masresha Getahun, Ben Othman Soufiene

    Published 2024-10-01
    “…Blockchain systems can lower platform costs and determine the optimal allocation of resources across a dispersed network by utilizing deep learning algorithms. …”
    Get full text
    Article
  7. 187

    The application of blockchain with a comparative approach and its impact on risk, flexibility and internal control evaluation by mohammadsadegh aminipoor, HamidReza GholamniaRoshan, azadeh kiapour, Iman Dadashi

    Published 2024-09-01
    “…In general, the use of blockchain can affect the following: Risk: Blockchain minimizes the possibility of changing and falsifying information by using strong encryption and security algorithms. Also, by using distributed technology, the reliability of data access and visibility increases. …”
    Get full text
    Article