Advanced Search Results For "COMPUTER security"
Your filters
Research on Medical Security System Based on Zero Trust.
Publication Type: Academic Journal
Source(s): Sensors (Basel, Switzerland) [Sensors (Basel)] 2023 Apr 06; Vol. 23 (7). Date of Electronic Publication: 2023 Apr 06.
Abstract: With the rapid development of Internet of Things technology, cloud computing, and big data, the combination of medical systems and information technology has become increasingly close. However, the emergence of intelligent medical systems has brought a...
Provably Secure and Lightweight Patient Monitoring Protocol for Wireless Body Area Network in IoHT.
Publication Type: Academic Journal
Source(s): Journal of healthcare engineering [J Healthc Eng] 2023 Feb 13; Vol. 2023, pp. 4845850. Date of Electronic Publication: 2023 Feb 13 (Print Publication: 2023).
Abstract: As one of the important applications of Internet of Health Things (IoHT) technology in the field of healthcare, wireless body area network (WBAN) has been widely used in medical therapy, and it can not only monitor and record physiological information ...
Random Matrix Transformation and Its Application in Image Hiding.
Publication Type: Academic Journal
Source(s): Sensors (Basel, Switzerland) [Sensors (Basel)] 2023 Jan 16; Vol. 23 (2). Date of Electronic Publication: 2023 Jan 16.
Abstract: Image coding technology has become an indispensable technology in the field of modern information. With the vigorous development of the big data era, information security has received more attention. Image steganography is an important method of image ...
Attack detection and mitigation scheme through novel authentication model enabled optimized neural network in smart healthcare.
Publication Type: Academic Journal
Source(s): Computer methods in biomechanics and biomedical engineering [Comput Methods Biomech Biomed Engin] 2023 Jan; Vol. 26 (1), pp. 38-64. Date of Electronic Publication: 2022 Mar 04.
Abstract: The Internet of Things (IoT) have become an important part of human in day-to-day life as it permits accesses and manages data flawlessly, the security of data in cloud storage is of great concern in healthcare applications. This paper proposes a secur...
Current-state opacity verification in discrete event systems using an observer net.
Publication Type: Academic Journal
Source(s): Scientific reports [Sci Rep] 2022 Dec 14; Vol. 12 (1), pp. 21572. Date of Electronic Publication: 2022 Dec 14.
Abstract: Due to the proliferation of contemporary computer-integrated systems and communication networks, there is more concern than ever regarding privacy, given the potential for sensitive data exploitation. A recent cyber-security research trend is to focus ...
An Efficient Chaos-Based Image Encryption Technique Using Bitplane Decay and Genetic Operators.
Publication Type: Academic Journal
Source(s): Sensors (Basel, Switzerland) [Sensors (Basel)] 2022 Oct 21; Vol. 22 (20). Date of Electronic Publication: 2022 Oct 21.
Abstract: Social networks have greatly expanded in the last ten years the need for sharing multimedia data. However, on open networks such as the Internet, where security is frequently compromised, it is simple for eavesdroppers to approach the actual contents w...
PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices.
Publication Type: Academic Journal
Source(s): Sensors (Basel, Switzerland) [Sensors (Basel)] 2022 Sep 19; Vol. 22 (18). Date of Electronic Publication: 2022 Sep 19.
Abstract: In IoT-based environments, smart services can be provided to users under various environments, such as smart homes, smart factories, smart cities, smart transportation, and healthcare, by utilizing sensing devices. Nevertheless, a series of security pr...
Security in V2I Communications: A Systematic Literature Review.
Publication Type: Academic Journal
Source(s): Sensors (Basel, Switzerland) [Sensors (Basel)] 2022 Nov 24; Vol. 22 (23). Date of Electronic Publication: 2022 Nov 24.
Abstract: Recently, the number of vehicles equipped with wireless connections has increased considerably. The impact of that growth in areas such as telecommunications, infotainment, and automatic driving is enormous. More and more drivers want to be part of a v...
Autonomous Mutual Authentication Protocol in the Edge Networks.
Publication Type: Academic Journal
Source(s): Sensors (Basel, Switzerland) [Sensors (Basel)] 2022 Oct 08; Vol. 22 (19). Date of Electronic Publication: 2022 Oct 08.
Abstract: A distinct security protocol is necessary for the exponential growth in intelligent edge devices. In particular, the autonomous devices need to address significant security concern to function smoothly in the high market demand. Nevertheless, exponenti...
Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions.
Publication Type: Academic Journal
Source(s): Sensors (Basel, Switzerland) [Sensors (Basel)] 2022 Nov 22; Vol. 22 (23). Date of Electronic Publication: 2022 Nov 22.
Abstract: The evolution of 5G and 6G networks has enhanced the ability of massive IoT devices to provide real-time monitoring and interaction with the surrounding environment. Despite recent advances, the necessary security services, such as immediate and contin...