keyword
https://read.qxmd.com/read/38607777/iot-based-external-attacks-aware-secure-healthcare-framework-using-blockchain-and-sb-rnn-nvs-fu-techniques
#1
JOURNAL ARTICLE
Ramesh Kuppusamy, Anbarasan Murugesan
BACKGROUND: In recent times, there has been widespread deployment of Internet of Things (IoT) applications, particularly in the healthcare sector, where computations involving user-specific data are carried out on cloud servers. However, the network nodes in IoT healthcare are vulnerable to an increased level of security threats. OBJECTIVE: This paper introduces a secure Electronic Health Record (EHR) framework with a focus on IoT. METHODS: Initially, the IoT sensor nodes are designated as registered patients and undergo initialization...
April 5, 2024: Technology and Health Care: Official Journal of the European Society for Engineering and Medicine
https://read.qxmd.com/read/38607776/enhancing-security-in-wireless-body-area-networks-wbans-with-ecc-based-diffie-hellman-key-exchange-algorithm-ecdh
#2
JOURNAL ARTICLE
Akilan S S, Kayathri Devi Devprasad, Raja Sekar J
BACKGROUND: Wireless Body Area Networks (WBANs) are integral to modern healthcare systems, providing continuous health monitoring and real-time data transmission. The sensitivity of medical data being transmitted makes security a significant concern in WBANs. OBJECTIVE: This study explores the application of the Elliptic Curve Cryptography (ECC)-based Diffie-Hellman Key Exchange (ECDH) algorithm to enhance security within WBANs. METHOD: The study investigates the suitability of ECC for this context and evaluates the performance and security implications of implementing ECDH in WBANs...
March 28, 2024: Technology and Health Care: Official Journal of the European Society for Engineering and Medicine
https://read.qxmd.com/read/38605103/design-of-efficient-binary-multiplier-architecture-using-hybrid-compressor-with-fpga-implementation
#3
JOURNAL ARTICLE
V Thamizharasan, V Parthipan
In signal processing applications, the multipliers are essential component of arithmetic functional units in many applications, like digital signal processors, image/video processing, Machine Learning, Cryptography and Arithmetic & Logical units (ALU). In recent years, Profuse multipliers are there. In that, Vedic multiplier is one of the high-performance multiplications and it is used to signal/image processing applications. In order to ameliorate the performance of this multiplier further, by proposed a novel multiplier using hybrid compressor...
April 11, 2024: Scientific Reports
https://read.qxmd.com/read/38580696/chemical-unclonable-functions-based-on-operable-random-dna-pools
#4
JOURNAL ARTICLE
Anne M Luescher, Andreas L Gimpel, Wendelin J Stark, Reinhard Heckel, Robert N Grass
Physical unclonable functions (PUFs) based on unique tokens generated by random manufacturing processes have been proposed as an alternative to mathematical one-way algorithms. However, these tokens are not distributable, which is a disadvantage for decentralized applications. Finding unclonable, yet distributable functions would help bridge this gap and expand the applications of object-bound cryptography. Here we show that large random DNA pools with a segmented structure of alternating constant and randomly generated portions are able to calculate distinct outputs from millions of inputs in a specific and reproducible manner, in analogy to physical unclonable functions...
April 5, 2024: Nature Communications
https://read.qxmd.com/read/38557695/e2ee-enhanced-patient-centric-blockchain-based-system-for-ehr-management
#5
JOURNAL ARTICLE
Alaa Haddad, Mohamed Hadi Habaebi, Elfatih A A Elsheikh, Md Rafiqul Islam, Suriza Ahmad Zabidi, Fakher Eldin M Suliman
To secure sensitive medical records in the healthcare clouds, this paper proposes an End-to-End Encryption (E2EE) to enhance a patient-centric blockchain-based system for electronic health record (EHR) management. The suggested system with a focus on the patient enables individuals to oversee their medical records within various involved parties by authorizing or withdrawing permission for access to their records. Utilizing the inter-planetary file system (IPFS) for record storage is chosen due to its decentralized nature and its ability to guarantee the unchangeability of records...
2024: PloS One
https://read.qxmd.com/read/38549348/secure-multimedia-communication-advanced-asymmetric-key-authentication-with-grayscale-visual-cryptography
#6
JOURNAL ARTICLE
Tao Liu, Shubhangi Vairagar, Sushadevi Adagale, T Karthick, Catherine Esther Karunya, John Blesswin A, Selva Mary G
The secure authentication of user data is crucial in various sectors, including digital banking, medical applications and e-governance, especially for images. Secure communication protects against data tampering and forgery, thereby bolstering the foundation for informed decision-making, whether managing traffic, enhancing public safety, or monitoring environmental conditions. Conventional visual cryptographic protocols offer solutions, particularly for color images, though they grapple with challenges such as high computational demands and reliance on multiple cover images...
February 29, 2024: Mathematical Biosciences and Engineering: MBE
https://read.qxmd.com/read/38527996/efficient-quantum-algorithms-for-set-operations
#7
JOURNAL ARTICLE
Rehab Elgendy, Ahmed Younes, H M Abu-Donia, R M Farouk
Analyzing the relations between Boolean functions has many applications in many fields, such as database systems, cryptography, and collision problems. This paper proposes four quantum algorithms that use amplitude amplification techniques to perform set operations, including Intersection, Difference, and Union, on two Boolean functions in <mml:math xmlns:mml="https://www.w3.org/1998/Math/MathML"><mml:mrow><mml:mi>O</mml:mi> <mml:mo>(</mml:mo> <mml:msqrt><mml:mi>N</mml:mi></mml:msqrt> <mml:mo>)</mml:mo></mml:mrow> </mml:math> time complexity...
March 25, 2024: Scientific Reports
https://read.qxmd.com/read/38516871/encrypted-image-classification-with-low-memory-footprint-using-fully-homomorphic-encryption
#8
JOURNAL ARTICLE
Lorenzo Rovida, Alberto Leporati
Classifying images has become a straightforward and accessible task, thanks to the advent of Deep Neural Networks. Nevertheless, not much attention is given to the privacy concerns associated with sensitive data contained in images. In this study, we propose a solution to this issue by exploring an intersection between Machine Learning and cryptography. In particular, Fully Homomorphic Encryption (FHE) emerges as a promising solution, as it enables computations to be performed on encrypted data. We therefore propose a Residual Network implementation based on FHE which allows the classification of encrypted images, ensuring that only the user can see the result...
March 22, 2024: International Journal of Neural Systems
https://read.qxmd.com/read/38480860/super-resolution-deep-neural-network-srdnn-based-multi-image-steganography-for-highly-secured-lossless-image-transmission
#9
JOURNAL ARTICLE
S Priya, S P Abirami, B Arunkumar, B Mishachandar
Information exchange and communication through the Internet are one of the most crucial aspects of today's information technology world. The security of information transmitted online has grown to be a critical concern, particularly in the transfer of medical data. To overcome this, the data must be delivered securely without being altered or lost. This can be possibly done by combining the principles of cryptography and steganography. In the recent past, steganography is used with simpler methods like the least significant bit manipulation technique, in order to encode a lower-resolution image into a higher-resolution image...
March 13, 2024: Scientific Reports
https://read.qxmd.com/read/38475211/bec-defender-qr-code-based-methodology-for-prevention-of-business-email-compromise-bec-attacks
#10
JOURNAL ARTICLE
Anastasios Papathanasiou, George Liontos, Georgios Paparis, Vasiliki Liagkou, Euripides Glavas
In an era of ever-evolving and increasingly sophisticated cyber threats, protecting sensitive information from cyberattacks such as business email compromise (BEC) attacks has become a top priority for individuals and enterprises. Existing methods used to counteract the risks linked to BEC attacks frequently prove ineffective because of the continuous development and evolution of these malicious schemes. This research introduces a novel methodology for safeguarding against BEC attacks called the BEC Defender...
March 5, 2024: Sensors
https://read.qxmd.com/read/38475091/preliminary-study-of-novel-bio-crypto-key-generation-using-clustering-based-binarization-of-ecg-features
#11
JOURNAL ARTICLE
Ho Bin Hwang, Jeyeon Lee, Hyeokchan Kwon, Byungho Chung, Jongshill Lee, In Young Kim
In modern society, the popularity of wearable devices has highlighted the need for data security. Bio-crypto keys (bio-keys), especially in the context of wearable devices, are gaining attention as a next-generation security method. Despite the theoretical advantages of bio-keys, implementing such systems poses practical challenges due to their need for flexibility and convenience. Electrocardiograms (ECGs) have emerged as a potential solution to these issues but face hurdles due to intra-individual variability...
February 28, 2024: Sensors
https://read.qxmd.com/read/38467643/systematic-review-and-meta-analysis-for-a-global-patient-co-owned-cloud-gpoc
#12
JOURNAL ARTICLE
Niklas Lidströmer, Joe Davids, Mohamed ElSharkawy, Hutan Ashrafian, Eric Herlenius
Cloud-based personal health records increase globally. The GPOC series introduces the concept of a Global Patient co-Owned Cloud (GPOC) of personal health records. Here, we present the GPOC series' Prospective Register of Systematic Reviews (PROSPERO) registered and Preferred Reporting Items Systematic and Meta-Analyses (PRISMA)-guided systematic review and meta-analysis. It examines cloud-based personal health records and factors such as data security, efficiency, privacy and cost-based measures. It is a meta-analysis of twelve relevant axes encompassing performance, cryptography and parameters based on efficiency (runtimes, key generation times), security (access policies, encryption, decryption) and cost (gas)...
March 11, 2024: Nature Communications
https://read.qxmd.com/read/38457732/randomness-certification-from-multipartite-quantum-steering-for-arbitrary-dimensional-systems
#13
JOURNAL ARTICLE
Yi Li, Yu Xiang, Xiao-Dong Yu, H Chau Nguyen, Otfried Gühne, Qiongyi He
Entanglement in bipartite systems has been applied to generate secure random numbers, which are playing an important role in cryptography or scientific numerical simulations. Here, we propose to use multipartite entanglement distributed between trusted and untrusted parties for generating randomness of arbitrary dimensional systems. We show that the distributed structure of several parties leads to additional protection against possible attacks by an eavesdropper, resulting in more secure randomness generated than in the corresponding bipartite scenario...
February 23, 2024: Physical Review Letters
https://read.qxmd.com/read/38439431/entanglement-based-quantum-digital-signatures-over-a-deployed-campus-network
#14
JOURNAL ARTICLE
Joseph C Chapman, Muneer Alshowkan, Bing Qi, Nicholas A Peters
The quantum digital signature protocol offers a replacement for most aspects of public-key digital signatures ubiquitous in today's digital world. A major advantage of a quantum-digital-signatures protocol is that it can have information-theoretic security, whereas public-key cryptography cannot. Here we demonstrate and characterize hardware to implement entanglement-based quantum digital signatures over our campus network. Over 25 hours, we collect measurements on our campus network, where we measure sufficiently low quantum bit error rates (<5% in most cases) which in principle enable quantum digital signatures at over 50 km as shown through rigorous simulation accompanied by a noise model developed specifically for our implementation...
February 26, 2024: Optics Express
https://read.qxmd.com/read/38439372/squeezing-as-a-resource-for-time-series-processing-in-quantum-reservoir-computing
#15
JOURNAL ARTICLE
Jorge García-Beni, Gian Luca Giorgi, Miguel C Soriano, Roberta Zambrini
Squeezing is known to be a quantum resource in many applications in metrology, cryptography, and computing, being related to entanglement in multimode settings. In this work, we address the effects of squeezing in neuromorphic machine learning for time-series processing. In particular, we consider a loop-based photonic architecture for reservoir computing and address the effect of squeezing in the reservoir, considering a Hamiltonian with both active and passive coupling terms. Interestingly, squeezing can be either detrimental or beneficial for quantum reservoir computing when moving from ideal to realistic models, accounting for experimental noise...
February 12, 2024: Optics Express
https://read.qxmd.com/read/38438449/robust-parallel-laser-driving-of-quantum-dots-for-multiplexing-of-quantum-light-sources
#16
JOURNAL ARTICLE
Ajan Ramachandran, Grant R Wilbur, Reuble Mathew, Allister Mason, Sabine O'Neal, Dennis G Deppe, Kimberley C Hall
Deterministic sources of quantum light (i.e. single photons or pairs of entangled photons) are required for a whole host of applications in quantum technology, including quantum imaging, quantum cryptography and the long-distance transfer of quantum information in future quantum networks. Semiconductor quantum dots are ideal candidates for solid-state quantum emitters as these artificial atoms have large dipole moments and a quantum confined energy level structure, enabling the realization of single photon sources with high repetition rates and high single photon purity...
March 4, 2024: Scientific Reports
https://read.qxmd.com/read/38438369/scalable-parallel-ultrafast-optical-random-bit-generation-based-on-a-single-chaotic-microcomb
#17
JOURNAL ARTICLE
Pu Li, Qizhi Li, Wenye Tang, Weiqiang Wang, Wenfu Zhang, Brent E Little, Sai Tek Chu, K Alan Shore, Yuwen Qin, Yuncai Wang
Random bit generators are critical for information security, cryptography, stochastic modeling, and simulations. Speed and scalability are key challenges faced by current physical random bit generation. Herein, we propose a massively parallel scheme for ultrafast random bit generation towards rates of order 100 terabit per second based on a single micro-ring resonator. A modulation-instability-driven chaotic comb in a micro-ring resonator enables the simultaneous generation of hundreds of independent and unbiased random bit streams...
March 5, 2024: Light, Science & Applications
https://read.qxmd.com/read/38435543/a-new-lattice-based-password-authenticated-key-exchange-scheme-with-anonymity-and-reusable-key
#18
JOURNAL ARTICLE
Kübra Seyhan, Sedat Akleylek
In this article, we propose a novel bilateral generalization inhomogenous short integer solution (BiGISIS)-based password-authenticated key exchange (PAKE) scheme for post-quantum era security. The hardness assumption of the constructed PAKE is based on newly proposed hard lattice problem, BiGISIS. The main aim of this article is to provide a solution for the post-quantum secure PAKE scheme, which is one of the open problems in the literature. The proposed PAKE is the first BiGISIS-based PAKE that satisfies anonymity and reusable key features...
2024: PeerJ. Computer Science
https://read.qxmd.com/read/38434343/improved-2-round-collision-attack-on-iot-hash-standard-ascon-hash
#19
JOURNAL ARTICLE
Di Zhai, Wei Bai, Jianding Fu, Hongjian Gao, Xueqiong Zhu
Lightweight cryptography algorithms are a class of ciphers designed to protect data generated and transmitted by the Internet of Things. They typically have low requirements in terms of storage space and power consumption, and are well-suited for resource-limited application scenarios such as embedded systems, actuators, and sensors. The NIST-approved competition for lightweight cryptography aims to identify lightweight cryptographic algorithms that can serve as standards. Its objective is to enhance data security in various scenarios...
March 15, 2024: Heliyon
https://read.qxmd.com/read/38423927/blockchain-technology-a-potential-tool-for-the-management-of-pharma-supply-chain
#20
REVIEW
Wasim Akram, Ramakant Joshi, Tanweer Haider, Pankaj Sharma, Vinay Jain, Navneet Garud, Nitin Singh
BACKGROUND: The pharma supply chain comprises various parties including distributors, manufacturers, raw material suppliers, regulators, pharmacies, hospitals, and patients. Due to the product's complexity and transaction flows, an efficient traceability system is needed in the pharma supply chain to identify the current and all previous product owners. Digitizing the track and trace process significantly improves regulatory oversight and guarantees product quality. A distributed platform for shared data that is immutable, trustworthy, accountable, and transparent in the pharmaceutical supply chain could be built using blockchain-based drug traceability...
February 23, 2024: Research in Social & Administrative Pharmacy: RSAP
keyword
keyword
168420
1
2
Fetch more papers »
Fetching more papers... Fetching...
Remove bar
Read by QxMD icon Read
×

Save your favorite articles in one place with a free QxMD account.

×

Search Tips

Use Boolean operators: AND/OR

diabetic AND foot
diabetes OR diabetic

Exclude a word using the 'minus' sign

Virchow -triad

Use Parentheses

water AND (cup OR glass)

Add an asterisk (*) at end of a word to include word stems

Neuro* will search for Neurology, Neuroscientist, Neurological, and so on

Use quotes to search for an exact phrase

"primary prevention of cancer"
(heart or cardiac or cardio*) AND arrest -"American Heart Association"

We want to hear from doctors like you!

Take a second to answer a survey question.