Key issues in healthcare data integrity: Analysis and recommendations

AK Pandey, AI Khan, YB Abushark, MM Alam… - IEEE …, 2020 - ieeexplore.ieee.org
Managing data integrity is a challenging task for any expert or a researcher. This study
attempts to collate a Systematic Literature Review of the research efforts done in the domain …

A survey and future directions on clustering: From WSNs to IoT and modern networking paradigms

A Shahraki, A Taherkordi, Ø Haugen… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Many Internet of Things (IoT) networks are created as an overlay over traditional ad-hoc
networks such as Zigbee. Moreover, IoT networks can resemble ad-hoc networks over …

[HTML][HTML] Privacy-enhancing distributed protocol for data aggregation based on blockchain and homomorphic encryption

C Regueiro, I Seco, S De Diego, O Lage… - Information Processing & …, 2021 - Elsevier
The recent increase in reported incidents of security breaches compromising users' privacy
call into question the current centralized model in which third-parties collect and control …

A survey of blockchain-based solutions for iots, vanets, and fanets

M Abdelhafidh, N Charef, AB Mnaouer… - Research Anthology on …, 2023 - igi-global.com
Recently, the internet of things (IoT) has gained popularity as an enabling technology for
wireless connectivity of mobile and/or stationary devices providing useful services for the …

[HTML][HTML] Mickey 2.0. 85: a secure and lighter MICKEY 2.0 cipher variant with improved power consumption for smaller devices in the IoT

A Alamer, B Soh, DE Brumbaugh - Symmetry, 2019 - mdpi.com
Lightweight stream ciphers have attracted significant attention in the last two decades due to
their security implementations in small devices with limited hardware. With low-power …

[PDF][PDF] A review on the verification approaches and tools used to verify the correctness of security algorithms and protocols

MAS Al-humaikani… - International Journal of …, 2019 - pdfs.semanticscholar.org
Security algorithms and protocols are typical essential upgrades that must be involved within
systems and their structures to provide the best performance. The protocols and systems …

Identifying and Evaluating the Effects of User Scenarios on the Data Integrity of Wearable Devices

R Wang, Y Wang, T Liao - Conference on Systems Engineering Research, 2023 - Springer
Wearable devices are able to sense, collect, and upload various physiological data. With the
technological improvements and progress in power, computation complexity, and size for …

Integrating Cybernetics into Healthcare Systems: Security Perspective

S Ali, J Khan, JP Li, M Ahmad, K Sharma… - … Intelligent Security in …, 2023 - taylorfrancis.com
In the healthcare business, the current era of digitalization and transformation brings with it a
slew of difficulties and benefits. The advantages are remarkable, but the concerns …

9 Integrating Cybernetics

S Ali, J Khan, JP Li, M Ahmad, K Sharma… - … Intelligent Security in …, 2023 - books.google.com
In the 1940s, the discipline of cybernetics was defined as “the scientific study of
interconnection or the scientific analysis of control and communication in animal and …

[PDF][PDF] SECURITY ASPECTS OF USING BLOCKCHAIN IN MANAGING HEALTHCARE INFORMATION

L George, JJ Kizhakkethottam - CONFERENCE SECRETARIAT, 2021 - sjcetpalai.ac.in
Blockchain has come a long way since its introduction in 2009, as the underlying technology
which implements the perception of distributed ledger in the first digital currency, bitcoin …