[HTML][HTML] Security of blockchain and AI-empowered smart healthcare: Application-based analysis
A Alabdulatif, I Khalil, M Saidur Rahman - Applied Sciences, 2022 - mdpi.com
A smart device carries a great amount of sensitive patient data as it offers innovative and
enhanced functionalities in the smart healthcare system. Moreover, the components of …
enhanced functionalities in the smart healthcare system. Moreover, the components of …
Blockchain-enabled authenticated key agreement scheme for mobile vehicles-assisted precision agricultural iot networks
Precision farming has a positive potential in the agricultural industry regarding water
conservation, increased productivity, better development of rural areas, and increased …
conservation, increased productivity, better development of rural areas, and increased …
Ensuring authentication in Medical Cyber-Physical Systems: a comprehensive literature review of blockchain technology integration with machine learning
Abstract Medical Cyber-Physical Systems (MCPS) are increasingly prevalent in an era of
rapid technological advancement. They hold significant importance for patients and …
rapid technological advancement. They hold significant importance for patients and …
A robust ECC-based authentication framework for energy internet (EI)-based vehicle to grid communication system
The integration of electric vehicles (EVs) into the smart grid system through Vehicle-to-Grid
(V2G) technology enables bi-directional power delivery, allowing EVs to distribute excess …
(V2G) technology enables bi-directional power delivery, allowing EVs to distribute excess …
Healthcare Applications Using Blockchain with a Cloud-Assisted Decentralized Privacy-Preserving Framework
In recent times, cloud-enabled healthcare services have gained much attention in fulfilling
the analysis of privacy risks associated with effective decision management systems …
the analysis of privacy risks associated with effective decision management systems …
Blockchain-Based Mutual Authentication Protocol for IoT-Enabled Decentralized Healthcare Environment
CM Chen, Z Chen, S Kumari… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
In the ever-evolving landscape of technology, healthcare continuously harnesses its
benefits, propelling advancements in medical practices. Within intelligent healthcare …
benefits, propelling advancements in medical practices. Within intelligent healthcare …
A privacy-preserved and user self-governance blockchain-based framework to combat COVID-19 depression in social media
M Zirui, G Bin - IEEE Access, 2023 - ieeexplore.ieee.org
Faced with the impact of the coronavirus disease (COVID-19) pandemic, governments must
protect the well-being of the population. Aside from considerations, such as keeping the …
protect the well-being of the population. Aside from considerations, such as keeping the …
Techniques and protocols for enhancing data privacy in cloud computing: A review
M Otieno - World Journal of Advanced Engineering Technology …, 2023 - wjaets.com
The emergence of cloud computing has enabled millions of devices across the globe to
communicate and exchange massive amounts of data that is classified as private with each …
communicate and exchange massive amounts of data that is classified as private with each …
ICSMPC: Design of an Iterative-Learning Contextual Side Chaining Model for Improving Security of Priority-Aware Cloud Resources
MG Brahmam - Journal of Grid Computing, 2023 - Springer
Purpose: A wide variety of encryption-based, key-exchange-based, privacy-based, and
confidentiality-based models are proposed by researchers, which assist in enhancing …
confidentiality-based models are proposed by researchers, which assist in enhancing …
Design of An Anomaly Detection Framework For Delay & Privacy-Aware Blockchain-Based Cloud Deployments
AV Nagarjun, S Rajkumar - IEEE Access, 2024 - ieeexplore.ieee.org
Cloud-based deployments face increasing threats from various types of attacks,
necessitating robust anomaly detection frameworks to safeguard against potential security …
necessitating robust anomaly detection frameworks to safeguard against potential security …