Key issues in healthcare data integrity: Analysis and recommendations
Managing data integrity is a challenging task for any expert or a researcher. This study
attempts to collate a Systematic Literature Review of the research efforts done in the domain …
attempts to collate a Systematic Literature Review of the research efforts done in the domain …
A survey and future directions on clustering: From WSNs to IoT and modern networking paradigms
Many Internet of Things (IoT) networks are created as an overlay over traditional ad-hoc
networks such as Zigbee. Moreover, IoT networks can resemble ad-hoc networks over …
networks such as Zigbee. Moreover, IoT networks can resemble ad-hoc networks over …
[HTML][HTML] Privacy-enhancing distributed protocol for data aggregation based on blockchain and homomorphic encryption
The recent increase in reported incidents of security breaches compromising users' privacy
call into question the current centralized model in which third-parties collect and control …
call into question the current centralized model in which third-parties collect and control …
A survey of blockchain-based solutions for iots, vanets, and fanets
M Abdelhafidh, N Charef, AB Mnaouer… - Research Anthology on …, 2023 - igi-global.com
Recently, the internet of things (IoT) has gained popularity as an enabling technology for
wireless connectivity of mobile and/or stationary devices providing useful services for the …
wireless connectivity of mobile and/or stationary devices providing useful services for the …
[HTML][HTML] Mickey 2.0. 85: a secure and lighter MICKEY 2.0 cipher variant with improved power consumption for smaller devices in the IoT
Lightweight stream ciphers have attracted significant attention in the last two decades due to
their security implementations in small devices with limited hardware. With low-power …
their security implementations in small devices with limited hardware. With low-power …
[PDF][PDF] A review on the verification approaches and tools used to verify the correctness of security algorithms and protocols
MAS Al-humaikani… - International Journal of …, 2019 - pdfs.semanticscholar.org
Security algorithms and protocols are typical essential upgrades that must be involved within
systems and their structures to provide the best performance. The protocols and systems …
systems and their structures to provide the best performance. The protocols and systems …
Identifying and Evaluating the Effects of User Scenarios on the Data Integrity of Wearable Devices
Wearable devices are able to sense, collect, and upload various physiological data. With the
technological improvements and progress in power, computation complexity, and size for …
technological improvements and progress in power, computation complexity, and size for …
Integrating Cybernetics into Healthcare Systems: Security Perspective
S Ali, J Khan, JP Li, M Ahmad, K Sharma… - … Intelligent Security in …, 2023 - taylorfrancis.com
In the healthcare business, the current era of digitalization and transformation brings with it a
slew of difficulties and benefits. The advantages are remarkable, but the concerns …
slew of difficulties and benefits. The advantages are remarkable, but the concerns …
9 Integrating Cybernetics
In the 1940s, the discipline of cybernetics was defined as “the scientific study of
interconnection or the scientific analysis of control and communication in animal and …
interconnection or the scientific analysis of control and communication in animal and …
[PDF][PDF] SECURITY ASPECTS OF USING BLOCKCHAIN IN MANAGING HEALTHCARE INFORMATION
L George, JJ Kizhakkethottam - CONFERENCE SECRETARIAT, 2021 - sjcetpalai.ac.in
Blockchain has come a long way since its introduction in 2009, as the underlying technology
which implements the perception of distributed ledger in the first digital currency, bitcoin …
which implements the perception of distributed ledger in the first digital currency, bitcoin …