Search

Your search keyword '"Data security"' showing total 19,373 results

Search Constraints

Start Over You searched for: Descriptor "Data security" Remove constraint Descriptor: "Data security" Publication Type Academic Journals Remove constraint Publication Type: Academic Journals
19,373 results on '"Data security"'

Search Results

1. A Preemptive and Curative Solution to Mitigate Data Breaches: Corporate Social Responsibility as a Double Layer of Protection.

2. HIPAA: A Demand to Modernize Health Legislation

3. DSpace 7 Benefits: Is It Worth Upgrading?

5. ПРОБЛЕМА ЗАХИСТУ ПЕРСОНАЛЬНИХ ДАНИХ В КІБЕРПРОСТОРІ

6. Applications of blockchain technology in privacy preserving and data security for real time (data) applications.

7. High‐contrast QPSK pattern recognition device consisting of a 4×$\times$4 MMI coupler.

8. Energy-aware multi-attribute trust modal for secure MANET-IoT environment.

9. Unlocking the potential of precision agriculture for sustainable farming.

10. Dynamic security in cloud computing based on fuzzy cognitive maps.

11. Multi‐Objective Federated Averaging Algorithm.

12. Only you can check my data: certificateless and designed-verifier auditing of multi-cloud storage with faults localization.

13. Application of zero trust model in preventing medical errors.

14. RTrust: toward robust trust evaluation framework for fake news detection in online social networks.

15. PIoT‐fortifying IoT device identity and data access: A security framework empowered by blockchain.

16. Dark patterns: EU's regulatory efforts.

17. Image encryption algorithm based on a memcapacitor‐based hyperchaotic system and DNA coding.

18. Blockchain Factors in the Design of Smart-Media for E-Healthcare Management.

19. Artificial Intelligence in Communication Sciences and Disorders: Introduction to the Forum.

20. Convolutional neural network (CNN) and federated learning-based privacy preserving approach for skin disease classification.

21. Choosing the right artificial intelligence solutions for your radiology department: key factors to consider.

22. ASMTP: Anonymous secure messaging token‐based protocol assisted data security in swarm of unmanned aerial vehicles.

23. Public Authentic-Replica Sampling Mechanism in Distributed Storage Environments.

24. A global perspective for improving recovery and recycling programs: text analysis approaches.

25. The rule of law system for China's marine security.

26. A DYNAMIC SANDBOX DETECTION TECHNIQUE IN A PRIVATE CLOUD ENVIRONMENT.

27. REVOLUTIONIZING CLOUD SECURITY: A NOVEL FRAMEWORK FOR ENHANCED DATA PROTECTION IN TRANSMISSION AND MIGRATION.

28. MOBILE DEVICE SECURITY: A TWO-LAYERED APPROACH WITH BLOCKCHAIN AND SENSOR TECHNOLOGY FOR THEFT PREVENTION.

29. AN ENHANCED RSA ALGORITHM TO COUNTER REPETITIVE CIPHERTEXT THREATS EMPOWERING USER-CENTRIC SECURITY.

30. Digital signatures in electronic health records: a scoping review.

31. Elliptic Curve Cryptography and Password Based Key Derivation Function with Advanced Encryption Standard Method for Cloud Data Security.

32. Digitalization of hypertension management: a paradigm shift.

33. Evolving trends, limitations, and ethical considerations in AI-driven conversational interfaces: assessing ChatGPT's impact on healthcare, financial services, and educational sectors.

34. Decentralized CP-ABE Scheme for Enhanced University Data Security Using Blockchain.

35. Thermo‐Optical Sub‐Micrometer Ultrahigh Luminescence Emission Tuning in Hybrid Organic–Inorganic Upconversion Nanocomposites for Data Storage and Anticounterfeiting.

36. Key-homomorphic and revocable ciphertext-policy attribute based key encapsulation mechanism for multimedia applications.

37. Ensuring the privacy and security of IoT-medical data: a hybrid deep learning-based encryption and blockchain-enabled transmission.

38. Privacy enhancing and generalizable deep learning with synthetic data for mediastinal neoplasm diagnosis.

39. High Capacity and Reversible Fragile Watermarking Method for Medical Image Authentication and Patient Data Hiding.

40. Blockchain for Edge Computing in Smart Environments: Use Cases, Issues, and Challenges.

41. An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain‐Based LLMs.

43. RCLNet: an effective anomaly-based intrusion detection for securing the IoMT system.

45. PQSF: post-quantum secure privacy-preserving federated learning.

46. Privacy-friendly evaluation of patient data with secure multiparty computation in a European pilot study.

47. Knowledge abstraction and filtering based federated learning over heterogeneous data views in healthcare.

48. Sharing for Caring? A Patients' and Clinicians' View on Handling Personal Medical Data in the Context of Digitization: An Exploratory Study.

49. Progress Achieved, Landmarks, and Future Concerns in Biomedical and Health Informatics.

50. Preparing for Connected and Automated Vehicles: Insights from North Carolina Transportation Professionals.

Catalog

Books, media, physical & digital resources