Search

Your search keyword '"data security"' showing total 9,426 results

Search Constraints

Start Over You searched for: Descriptor "data security" Remove constraint Descriptor: "data security"
9,426 results on '"data security"'

Search Results

1. Human Intuition and Algorithmic Efficiency Must Be Balanced to Enhance Data Mesh Resilience.

2. The Pros and Cons of Regulating Artificial Intelligence.

3. DSpace 7 Benefits: Is It Worth Upgrading?

4. Internet of Things Security and Privacy Labels Should Empower Consumers.

5. Enhancing security in blockchain-based EHR retrieval: A comparative analysis of block ciphers with a special emphasis on PRESENT-80.

6. A data security model for internet of things applications.

7. Analysis of password after encryption by using the combination of AES256 and MD5 algorithm methods.

8. Survey of research on confidential computing.

9. The rise of the apps: FTC and DOJ crack down on provider selling data.

10. Needs, expectations, facilitators, and barriers among insurance physicians related to the use of eHealth in their work: results of a survey.

11. An AI-empowered indoor digital contact tracing system for COVID-19 outbreaks in residential care homes.

12. Zero watermarking algorithm for BIM data based on distance partitioning and local feature.

13. Barriers and benefits of mHealth for community health workers in integrated community case management of childhood diseases in Banda Parish, Kampala, Uganda: a cross-sectional study.

14. Blockchain Interoperability in Data Exchange Logistics Integration.

15. ARS-Chain: A Blockchain-Based Anonymous Reputation-Sharing Framework for E-Commerce Platforms.

16. Event‐based privacy‐preserving security consensus of multi‐agent systems with encryption–decryption mechanism.

17. Analysis of healthcare data security with DWT-HD-SVD based-algorithm invisible watermarking against multi-size watermarks.

18. An optimal multipath routing protocol using hybrid gravitational search particle swarm optimization for secure communication.

19. Inter-Channel Correlation Modeling and Improved Skewed Histogram Shifting for Reversible Data Hiding in Color Images.

20. An empirical investigation of the social web gendered privacy model.

21. Improving big data governance in healthcare institutions: user experience research for honest broker based application to access healthcare big data.

22. Smart Speaker and ICT Use in Relationship With Social Connectedness During the Pandemic: Loneliness and Social Isolation Found in Older Adults in Low-Income Housing.

23. Telesurgery Poses Unique Ethical Considerations.

24. On the Layout-Oriented Investigation of Power Attack Hardness of Spintronic-Based Logic Circuits.

25. European Dreams of the Cloud: Imagining Innovation and Political Control.

26. Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks.

27. End-to-end data security with DMaya on IPFS: keyless secured private swarm for the closed user group.

28. IPPASOS: The first digital forensic information system in Greece.

29. Chiral Meta‐Coder for Spin Switchable Electromagnetic Camouflage and Information Authentication.

30. Cost-Effective Signcryption for Securing IoT: A Novel Signcryption Algorithm Based on Hyperelliptic Curves.

31. Securing cloud data using secret key 4 optimization algorithm (SK4OA) with a non-linearity run time trend.

32. Protecting people with disabilities' data privacy in government information disclosure: facilitation by procurator-led public-interest litigation.

33. A Blockchain-Based Secure Sharing Scheme for Electrical Impedance Tomography Data.

34. The Potential of AI and ChatGPT in Improving Agricultural Injury and Illness Surveillance Programming and Dissemination.

35. A BPSO based collaborative management platform for multi-source data security in power grids.

36. A novel method for indian vehicle registration number plate detection and recognition using CNN.

37. SDACS: Blockchain-Based Secure and Dynamic Access Control Scheme for Internet of Things.

38. Insider employee-led cyber fraud (IECF) in Indian banks: from identification to sustainable mitigation planning.

39. De Bello Homomorphico: Investigation of the extensibility of the OpenFHE library with basic mathematical functions by means of common approaches using the example of the CKKS cryptosystem.

40. Brain Data in Context: Are New Rights the Way to Mental and Brain Privacy?

41. (How) ChatGPT--Artificial Intelligence Thinks It Can Help/Harm Physiatry.

42. Data acquisition and application of internet of things in financial management.

43. A combination of hill cipher and RC4 methods for text security.

44. Pre-extension Demonstration and Popularization of Silk Production Technologies in South Ethiopia.

45. A Review on Searchable Encryption Functionality and the Evaluation of Homomorphic Encryption.

46. Secure cloud storage auditing with deduplication and efficient data transfer.

47. Securing the medical data using enhanced privacy preserving based blockchain technology in Internet of Things.

48. Attitudes towards artificial intelligence in emergency medicine.

49. Data security and data transmission delay trade-offs inhealthcare blockchain techniques.

50. A review of data security of blockchain applications in social media.

Catalog

Books, media, physical & digital resources