Identity-based authenticated multi-keyword searchable encryption scheme for cloud-assisted telemedicine information system

H Liu, L Deng, Y Mou, B Li, J Wen - Computers and Electrical Engineering, 2024 - Elsevier
In cloud-assisted telemedicine information system (CA-TMIS), patients upload data
containing their health metrics to the cloud. Doctors can access the patient's data through …

Intrusion Detection Using CTGAN and Lightweight Neural Network for Internet of Things

S Das, A Majumder, S Namasudra, A Singh - Expert Systems, 2024 - Wiley Online Library
Deep learning‐based intrusion detection systems have high accuracy and low false alarm
rates. However, there are challenges to deploy deep learning models in the vulnerable …

Blockchain-based secure and scalable supply chain management system to prevent drug counterfeiting

S Datta, S Namasudra - Cluster Computing, 2024 - Springer
A drug supply chain comprises the entire process starting from producing a drug using raw
materials to delivering it to the consumer. To ensure safe and reliable delivery of drugs to …

Insights Into Cloud Computing: Unveiling Trends, Addressing Challenges, and Exploring Opportunities-A Systematic Review

R Kait, T Kumar - 2024 International Conference on …, 2024 - ieeexplore.ieee.org
The methodical research provides a comprehensive overview of the current state of cloud
computing, with a specific focus on trends, barriers, and potential. This article analyzes …

[PDF][PDF] A Smart Healthcare System Using Consumer Electronics and Federated Learning to Automatically Diagnose Diabetic Foot Ulcers

SK Das, NR Moparthi, S Namasudra, RG Crespo… - researchgate.net
Privacy breaches on sensitive and widely distributed health data in consumer electronics
(CE) demand novel strategies to protect privacy with correctness and proper operation …

Cybersecurity Compliance Frameworks-a pragmatic view with an IT outsourcing company case study

RJ Robinson - Social Lens, 2024 - socialsciencesresearch.com
This paper practically deals with the theoretical base drawn from the standards and rules
posed by various international bodies in terms of information security. To start with, this …

[PDF][PDF] ANALISIS KESADARAN MAHASISWA ITS TERHADAP KEAMANAN PRIVASI DATA PADA LAYANAN CLOUD COMPUTING

TS HADINANDA, DA SYARIF, IDWI PRASETYO… - researchgate.net
Keamanan privasi data dalam layanan cloud computing menjadi krusial seiring
meningkatnya penggunaan platform digital oleh mahasiswa untuk penyimpanan dan …

[引用][C] Security challenges in cloud computing: A comprehensive analysis

JJ Ang'udi - World Journal of Advanced …, 2023 - World Journal of Advanced …

[引用][C] Prevent Network-Related Attacks with Load Balancing in Cloud Services Providers

AKJ Oliviera, GA Khan, T Anwara, J Khana, Z Ashrafb