Identity-based authenticated multi-keyword searchable encryption scheme for cloud-assisted telemedicine information system
H Liu, L Deng, Y Mou, B Li, J Wen - Computers and Electrical Engineering, 2024 - Elsevier
In cloud-assisted telemedicine information system (CA-TMIS), patients upload data
containing their health metrics to the cloud. Doctors can access the patient's data through …
containing their health metrics to the cloud. Doctors can access the patient's data through …
Intrusion Detection Using CTGAN and Lightweight Neural Network for Internet of Things
S Das, A Majumder, S Namasudra, A Singh - Expert Systems, 2024 - Wiley Online Library
Deep learning‐based intrusion detection systems have high accuracy and low false alarm
rates. However, there are challenges to deploy deep learning models in the vulnerable …
rates. However, there are challenges to deploy deep learning models in the vulnerable …
Blockchain-based secure and scalable supply chain management system to prevent drug counterfeiting
S Datta, S Namasudra - Cluster Computing, 2024 - Springer
A drug supply chain comprises the entire process starting from producing a drug using raw
materials to delivering it to the consumer. To ensure safe and reliable delivery of drugs to …
materials to delivering it to the consumer. To ensure safe and reliable delivery of drugs to …
Insights Into Cloud Computing: Unveiling Trends, Addressing Challenges, and Exploring Opportunities-A Systematic Review
The methodical research provides a comprehensive overview of the current state of cloud
computing, with a specific focus on trends, barriers, and potential. This article analyzes …
computing, with a specific focus on trends, barriers, and potential. This article analyzes …
[PDF][PDF] A Smart Healthcare System Using Consumer Electronics and Federated Learning to Automatically Diagnose Diabetic Foot Ulcers
Privacy breaches on sensitive and widely distributed health data in consumer electronics
(CE) demand novel strategies to protect privacy with correctness and proper operation …
(CE) demand novel strategies to protect privacy with correctness and proper operation …
Cybersecurity Compliance Frameworks-a pragmatic view with an IT outsourcing company case study
RJ Robinson - Social Lens, 2024 - socialsciencesresearch.com
This paper practically deals with the theoretical base drawn from the standards and rules
posed by various international bodies in terms of information security. To start with, this …
posed by various international bodies in terms of information security. To start with, this …
[PDF][PDF] ANALISIS KESADARAN MAHASISWA ITS TERHADAP KEAMANAN PRIVASI DATA PADA LAYANAN CLOUD COMPUTING
TS HADINANDA, DA SYARIF, IDWI PRASETYO… - researchgate.net
Keamanan privasi data dalam layanan cloud computing menjadi krusial seiring
meningkatnya penggunaan platform digital oleh mahasiswa untuk penyimpanan dan …
meningkatnya penggunaan platform digital oleh mahasiswa untuk penyimpanan dan …