Search

Your search keyword '"Data security"' showing total 18,858 results

Search Constraints

Start Over You searched for: Descriptor "Data security" Remove constraint Descriptor: "Data security" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed
18,858 results on '"Data security"'

Search Results

1. A Preemptive and Curative Solution to Mitigate Data Breaches: Corporate Social Responsibility as a Double Layer of Protection.

2. DSpace 7 Benefits: Is It Worth Upgrading?

4. ПРОБЛЕМА ЗАХИСТУ ПЕРСОНАЛЬНИХ ДАНИХ В КІБЕРПРОСТОРІ

5. Applications of blockchain technology in privacy preserving and data security for real time (data) applications.

6. Energy-aware multi-attribute trust modal for secure MANET-IoT environment.

7. High‐contrast QPSK pattern recognition device consisting of a 4×$\times$4 MMI coupler.

8. Unlocking the potential of precision agriculture for sustainable farming.

9. Dynamic security in cloud computing based on fuzzy cognitive maps.

10. Multi‐Objective Federated Averaging Algorithm.

11. Only you can check my data: certificateless and designed-verifier auditing of multi-cloud storage with faults localization.

12. Application of zero trust model in preventing medical errors.

13. RTrust: toward robust trust evaluation framework for fake news detection in online social networks.

14. PIoT‐fortifying IoT device identity and data access: A security framework empowered by blockchain.

15. Dark patterns: EU's regulatory efforts.

16. Image encryption algorithm based on a memcapacitor‐based hyperchaotic system and DNA coding.

17. Technology Update in Management of Multi-Ligament Knee Injuries.

18. An Efficient Pairing-Free Ciphertext-Policy Attribute-Based Encryption Scheme for Internet of Things.

19. Blockchain Factors in the Design of Smart-Media for E-Healthcare Management.

20. Artificial Intelligence in Communication Sciences and Disorders: Introduction to the Forum.

21. Convolutional neural network (CNN) and federated learning-based privacy preserving approach for skin disease classification.

22. Choosing the right artificial intelligence solutions for your radiology department: key factors to consider.

23. ASMTP: Anonymous secure messaging token‐based protocol assisted data security in swarm of unmanned aerial vehicles.

24. A Narrative Review of Identity, Data and Location Privacy Techniques in Edge Computing and Mobile Crowdsourcing.

25. Public Authentic-Replica Sampling Mechanism in Distributed Storage Environments.

26. A Smart Healthcare System for Remote Areas Based on the Edge–Cloud Continuum.

27. IoV block secure: blockchain based secure data collection and validation framework for internet of vehicles network.

28. SCMABC Algorithm-based routing for secure and efficient data transmission in smart grid AMI networks.

29. A global perspective for improving recovery and recycling programs: text analysis approaches.

30. The rule of law system for China's marine security.

31. A DYNAMIC SANDBOX DETECTION TECHNIQUE IN A PRIVATE CLOUD ENVIRONMENT.

32. REVOLUTIONIZING CLOUD SECURITY: A NOVEL FRAMEWORK FOR ENHANCED DATA PROTECTION IN TRANSMISSION AND MIGRATION.

33. MOBILE DEVICE SECURITY: A TWO-LAYERED APPROACH WITH BLOCKCHAIN AND SENSOR TECHNOLOGY FOR THEFT PREVENTION.

34. AN ENHANCED RSA ALGORITHM TO COUNTER REPETITIVE CIPHERTEXT THREATS EMPOWERING USER-CENTRIC SECURITY.

35. Digital signatures in electronic health records: a scoping review.

36. Elliptic Curve Cryptography and Password Based Key Derivation Function with Advanced Encryption Standard Method for Cloud Data Security.

37. Digitalization of hypertension management: a paradigm shift.

38. Evolving trends, limitations, and ethical considerations in AI-driven conversational interfaces: assessing ChatGPT's impact on healthcare, financial services, and educational sectors.

39. Decentralized CP-ABE Scheme for Enhanced University Data Security Using Blockchain.

40. Thermo‐Optical Sub‐Micrometer Ultrahigh Luminescence Emission Tuning in Hybrid Organic–Inorganic Upconversion Nanocomposites for Data Storage and Anticounterfeiting.

41. Key-homomorphic and revocable ciphertext-policy attribute based key encapsulation mechanism for multimedia applications.

42. Ensuring the privacy and security of IoT-medical data: a hybrid deep learning-based encryption and blockchain-enabled transmission.

43. Privacy enhancing and generalizable deep learning with synthetic data for mediastinal neoplasm diagnosis.

44. High Capacity and Reversible Fragile Watermarking Method for Medical Image Authentication and Patient Data Hiding.

45. Blockchain for Edge Computing in Smart Environments: Use Cases, Issues, and Challenges.

46. An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain‐Based LLMs.

48. RCLNet: an effective anomaly-based intrusion detection for securing the IoMT system.

49. PQSF: post-quantum secure privacy-preserving federated learning.

50. Privacy-friendly evaluation of patient data with secure multiparty computation in a European pilot study.

Catalog

Books, media, physical & digital resources