• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4615184)   Today's Articles (5734)   Subscriber (49392)
For: Alloghani M, M. Alani M, Al-jumeily D, Baker T, Mustafina J, Hussain A, J. Aljaaf A. A systematic review on the status and progress of homomorphic encryption technologies. Journal of Information Security and Applications 2019;48:102362. [DOI: 10.1016/j.jisa.2019.102362] [Citation(s) in RCA: 14] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/22/2022]
Number Cited by Other Article(s)
1
Hiwale M, Walambe R, Potdar V, Kotecha K. A systematic review of privacy-preserving methods deployed with blockchain and federated learning for the telemedicine. HEALTHCARE ANALYTICS (NEW YORK, N.Y.) 2023;3:100192. [PMID: 37223223 PMCID: PMC10160179 DOI: 10.1016/j.health.2023.100192] [Citation(s) in RCA: 2] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 02/25/2023] [Revised: 04/18/2023] [Accepted: 04/30/2023] [Indexed: 05/25/2023]
2
Anik FI, Sakib N, Shahriar H, Xie Y, Nahiyan HA, Ahamed SI. Unraveling a blockchain-based framework towards patient empowerment: A scoping review envisioning future smart health technologies. SMART HEALTH (AMSTERDAM, NETHERLANDS) 2023;29:100401. [PMID: 37200573 PMCID: PMC10102703 DOI: 10.1016/j.smhl.2023.100401] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 11/21/2022] [Revised: 01/15/2023] [Accepted: 04/10/2023] [Indexed: 05/20/2023]
3
Rodrigues VF, da Rosa Righi R, da Costa CA, Zeiser FA, Eskofier B, Maier A, Kim D. Digital health in smart cities: Rethinking the remote health monitoring architecture on combining edge, fog, and cloud. HEALTH AND TECHNOLOGY 2023;13:449-472. [PMID: 37303980 PMCID: PMC10139834 DOI: 10.1007/s12553-023-00753-3] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/22/2023] [Accepted: 04/06/2023] [Indexed: 06/13/2023]
4
Vanin FNDS, Policarpo LM, Righi RDR, Heck SM, da Silva VF, Goldim J, da Costa CA. A Blockchain-Based End-to-End Data Protection Model for Personal Health Records Sharing: A Fully Homomorphic Encryption Approach. SENSORS (BASEL, SWITZERLAND) 2022;23:14. [PMID: 36616613 PMCID: PMC9823636 DOI: 10.3390/s23010014] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 11/10/2022] [Revised: 12/09/2022] [Accepted: 12/09/2022] [Indexed: 06/17/2023]
5
BFV-Based Homomorphic Encryption for Privacy-Preserving CNN Models. CRYPTOGRAPHY 2022. [DOI: 10.3390/cryptography6030034] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/04/2023]
6
Jayaram R, Prabakaran S. Onboard disease prediction and rehabilitation monitoring on secure edge-cloud integrated privacy preserving healthcare system. EGYPTIAN INFORMATICS JOURNAL 2021. [DOI: 10.1016/j.eij.2020.12.003] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
7
Abbas G, Tanveer M, Abbas ZH, Waqas M, Baker T, Al-Jumeily OBE D. A secure remote user authentication scheme for 6LoWPAN-based Internet of Things. PLoS One 2021;16:e0258279. [PMID: 34748568 PMCID: PMC8575280 DOI: 10.1371/journal.pone.0258279] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/30/2021] [Accepted: 09/22/2021] [Indexed: 11/18/2022]  Open
8
Wu Y, Zeng S, Wu B, Yang B, Chen X. Quantitative Weighted Visual Cryptographic (k, m, n) Method. SECURITY AND COMMUNICATION NETWORKS 2021;2021:1-13. [DOI: 10.1155/2021/9968652] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA