Search

Showing total 886 results

Search Constraints

Start Over You searched for: Search Limiters Full Text Remove constraint Search Limiters: Full Text Topic data security Remove constraint Topic: data security Publisher mdpi Remove constraint Publisher: mdpi
886 results

Search Results

1. Self-Sovereign Identity-Based E-Portfolio Ecosystem.

2. What Is the Current Status of Research on the Impact of Digitalization in Medicine? A Bibliometric Analysis.

3. Zero-Trust Access Control Mechanism Based on Blockchain and Inner-Product Encryption in the Internet of Things in a 6G Environment.

4. Integrating Blockchain, IoT, and XBRL in Accounting Information Systems: A Systematic Literature Review.

5. An Application Programming Interface (API) Sensitive Data Identification Method Based on the Federated Large Language Model.

6. Implementation of a Partial-Order Data Security Model for the Internet of Things (IoT) Using Software-Defined Networking (SDN).

7. Research on Convergence Media Ecological Model Based on Blockchain.

8. Fault Diagnosis Techniques for Electrical Distribution Network Based on Artificial Intelligence and Signal Processing: A Review.

9. Zero Trust Cybersecurity: Procedures and Considerations in Context.

10. Ethereum Smart Contract Vulnerability Detection and Machine Learning-Driven Solutions: A Systematic Literature Review.

11. Research on the Trusted Traceability Model of Taishan Tea Products Based on Blockchain.

12. Progress Achieved, Landmarks, and Future Concerns in Biomedical and Health Informatics.

13. Regional Load Forecasting Scheme for Security Outsourcing Computation.

14. Protection of Personal Data in the Context of E-Commerce.

15. User Acceptance of Blockchain Technology in Financial Applications: Information Security, Technology Awareness and Privacy Aspects.

16. Digital Twins in Construction: Architecture, Applications, Trends and Challenges.

17. Research on Grid Multi-Source Survey Data Sharing Algorithm for Cross-Professional and Cross-Departmental Operations Collaboration.

18. Hierarchical-Based Dynamic Scenario-Adaptive Risk Assessment for Power Data Lifecycle.

19. Secure Control of Linear Controllers Using Fully Homomorphic Encryption.

20. Integrity and Privacy Assurance Framework for Remote Healthcare Monitoring Based on IoT.

21. A Stealthy Communication Model with Blockchain Smart Contract for Bidding Systems.

22. A Deep Learning-Based Method for Preventing Data Leakage in Electric Power Industrial Internet of Things Business Data Interactions.

23. Trustworthiness of Situational Awareness: Significance and Quantification.

24. Enhancing Visual Data Security: A Novel FSM-Based Image Encryption and Decryption Methodology.

25. Linguistic Methods of Image Division for Visual Data Security.

26. Blockchain Applications in the Military Domain: A Systematic Review.

27. A Survey of Efficient Lightweight Cryptography for Power-Constrained Microcontrollers.

28. Energy-Efficient and Trust-Based Autonomous Underwater Vehicle Scheme for 6G-Enabled Internet of Underwater Things.

29. AllianceBlockchain in the Governance Innovation of Internet Hospitals.

30. Hierarchical Aggregation for Federated Learning in Heterogeneous IoT Scenarios: Enhancing Privacy and Communication Efficiency.

31. A Blockchain-Assisted Federated Learning Framework for Secure and Self-Optimizing Digital Twins in Industrial IoT.

32. A Blockchain Multi-Chain Federated Learning Framework for Enhancing Security and Efficiency in Intelligent Unmanned Ports.

33. Implantable Medical Device Security.

34. A State-of-the-Art Review and Bibliometric Analysis on the Smart Preservation of Heritages.

35. Privacy-Preserving Data Sharing in Telehealth Services.

36. Enhancing Autonomous Vehicle Safety with Blockchain Technology: Securing Vehicle Communication and AI Systems.

37. Efficient Runtime Firmware Update Mechanism for LoRaWAN Class A Devices.

38. An Enhanced Learning with Error-Based Cryptosystem: A Lightweight Quantum-Secure Cryptography Method.

39. Development of Security Rules and Mechanisms to Protect Data from Assaults.

40. An IHPO-WNN-Based Federated Learning System for Area-Wide Power Load Forecasting Considering Data Security Protection.

41. A Holistic Review of Cyber–Physical–Social Systems: New Directions and Opportunities.

42. Trust Management Scheme of IoV Based on Dynamic Sharding Blockchain †.

43. Real-Time Monitoring and Management of Hardware and Software Resources in Heterogeneous Computer Networks through an Integrated System Architecture.

44. AFF_CGE: Combined Attention-Aware Feature Fusion and Communication Graph Embedding Learning for Detecting Encrypted Malicious Traffic.

45. Secure and Flexible Privacy-Preserving Federated Learning Based on Multi-Key Fully Homomorphic Encryption.

46. Public Authentic-Replica Sampling Mechanism in Distributed Storage Environments.

47. An Efficient Pairing-Free Ciphertext-Policy Attribute-Based Encryption Scheme for Internet of Things.

48. Literature Review of Explainable Tabular Data Analysis.

49. An Attribute-Based End-to-End Policy-Controlled Signcryption Scheme for Secure Group Chat Communication.

50. Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal's Principles.