Journal articles on the topic 'Support secure data processing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Support secure data processing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Sun, Yan, and Shambhu Upadhyaya. "Secure and privacy preserving data processing support for active authentication." Information Systems Frontiers 17, no. 5 (July 29, 2015): 1007–15. http://dx.doi.org/10.1007/s10796-015-9587-9.
Full textJariwala, Vivaksha, Himanshu Patel, Parth Patel, and Devesh C. Jinwala. "Integrity and Privacy Preserving Secure Data Aggregation in Wireless Sensor Networks." International Journal of Distributed Systems and Technologies 5, no. 3 (July 2014): 77–99. http://dx.doi.org/10.4018/ijdst.2014070104.
Full textWang, Ziheng, Heng Chen, and Weiguo Wu. "Client-Aware Negotiation for Secure and Efficient Data Transmission." Energies 13, no. 21 (November 4, 2020): 5777. http://dx.doi.org/10.3390/en13215777.
Full textSeniman, Seniman, Baihaqi Siregar, Rani Masyithah Pelle, and Fahmi Fahmi. "Securing sensor data transmission with ethernet elliptic curve cryptography secure socket layer on STM32F103 device." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (April 1, 2021): 507. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp507-515.
Full textMarwan, Mbarek, Ali Karti, and Hassan Ouahmane. "Proposal for a Secure Data Sharing and Processing in Cloud Applications for Healthcare Domain." International Journal of Information Technology and Applied Sciences (IJITAS) 3, no. 1 (January 31, 2021): 10–17. http://dx.doi.org/10.52502/ijitas.v3i1.15.
Full textAlenezi, Mamdouh, Muhammad Usama, Khaled Almustafa, Waheed Iqbal, Muhammad Ali Raza, and Tanveer Khan. "An Efficient, Secure, and Queryable Encryption for NoSQL-Based Databases Hosted on Untrusted Cloud Environments." International Journal of Information Security and Privacy 13, no. 2 (April 2019): 14–31. http://dx.doi.org/10.4018/ijisp.2019040102.
Full textHamza, Rafik, Alzubair Hassan, Awad Ali, Mohammed Bakri Bashir, Samar M. Alqhtani, Tawfeeg Mohmmed Tawfeeg, and Adil Yousif. "Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms." Entropy 24, no. 4 (April 6, 2022): 519. http://dx.doi.org/10.3390/e24040519.
Full textAlsaig, Alaa, Vangalur Alagar, Zaki Chammaa, and Nematollaah Shiri. "Characterization and Efficient Management of Big Data in IoT-Driven Smart City Development." Sensors 19, no. 11 (May 28, 2019): 2430. http://dx.doi.org/10.3390/s19112430.
Full textMeister, Sam, and Alexandra Chassanoff. "Integrating Digital Forensics Techniques into Curatorial Tasks: A Case Study." International Journal of Digital Curation 9, no. 2 (September 9, 2014): 6–16. http://dx.doi.org/10.2218/ijdc.v9i2.325.
Full textSánchez, Daniel, Andrés López, Florina Mendoza, and Patricia Arias Cabarcos. "DNS-Based Dynamic Authentication for Microservices in IoT." Proceedings 2, no. 19 (October 25, 2018): 1233. http://dx.doi.org/10.3390/proceedings2191233.
Full textPrzytarski, Dennis, Christoph Stach, Clémentine Gritti, and Bernhard Mitschang. "Query Processing in Blockchain Systems: Current State and Future Challenges." Future Internet 14, no. 1 (December 21, 2021): 1. http://dx.doi.org/10.3390/fi14010001.
Full textSun, Shuang, Rong Du, and Shudong Chen. "A Secure and Computable Blockchain-Based Data Sharing Scheme in IoT System." Information 12, no. 2 (January 20, 2021): 47. http://dx.doi.org/10.3390/info12020047.
Full textŠtufi, Martin, Boris Bačić, and Leonid Stoimenov. "Big Data Analytics and Processing Platform in Czech Republic Healthcare." Applied Sciences 10, no. 5 (March 2, 2020): 1705. http://dx.doi.org/10.3390/app10051705.
Full textShang, Jian, Runmin Guan, and Yuhao Tong. "Microgrid Data Security Sharing Method Based on Blockchain under Internet of Things Architecture." Wireless Communications and Mobile Computing 2022 (April 4, 2022): 1–10. http://dx.doi.org/10.1155/2022/9623934.
Full textZhang, Yinghui, Jiangfan Zhao, Dong Zheng, Kaixin Deng, Fangyuan Ren, Xiaokun Zheng, and Jiangang Shu. "Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing." Sensors 18, no. 8 (August 13, 2018): 2659. http://dx.doi.org/10.3390/s18082659.
Full textAl Ridhawi, Ismaeel, Ouns Bouachir, Moayad Aloqaily, and Azzedine Boukerche. "Design Guidelines for Cooperative UAV-supported Services and Applications." ACM Computing Surveys 54, no. 9 (December 31, 2022): 1–35. http://dx.doi.org/10.1145/3467964.
Full textNavale, Vivek, Denis von Kaeppler, and Matthew McAuliffe. "An overview of biomedical platforms for managing research data." Journal of Data, Information and Management 3, no. 1 (January 23, 2021): 21–27. http://dx.doi.org/10.1007/s42488-020-00040-0.
Full textPascoal, Túlio, Jérémie Decouchant, Antoine Boutet, and Paulo Esteves-Verissimo. "DyPS: Dynamic, Private and Secure GWAS." Proceedings on Privacy Enhancing Technologies 2021, no. 2 (January 29, 2021): 214–34. http://dx.doi.org/10.2478/popets-2021-0025.
Full textHong, Jun, Tao Wen, Quan Guo, and Zhengwang Ye. "Secure kNN Computation and Integrity Assurance of Data Outsourcing in the Cloud." Mathematical Problems in Engineering 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/8109730.
Full textChen, Yingwen, Bowen Hu, Hujie Yu, Zhimin Duan, and Junxin Huang. "A Threshold Proxy Re-Encryption Scheme for Secure IoT Data Sharing Based on Blockchain." Electronics 10, no. 19 (September 27, 2021): 2359. http://dx.doi.org/10.3390/electronics10192359.
Full textCho, Jae Hyuk, Yunhee Kang, and Young B. Park. "Secure Delivery Scheme of Common Data Model for Decentralized Cloud Platforms." Applied Sciences 10, no. 20 (October 13, 2020): 7134. http://dx.doi.org/10.3390/app10207134.
Full textKhalid, Haqi, Shaiful Jahari Hashim, Sharifah Mumtazah Syed Ahmad, Fazirulhisyam Hashim, and Muhammad Akmal Chaudhary. "Cross-SN: A Lightweight Authentication Scheme for a Multi-Server Platform Using IoT-Based Wireless Medical Sensor Network." Electronics 10, no. 7 (March 26, 2021): 790. http://dx.doi.org/10.3390/electronics10070790.
Full textVaghela, Uddhav, Simon Rabinowicz, Paris Bratsos, Guy Martin, Epameinondas Fritzilas, Sheraz Markar, Sanjay Purkayastha, et al. "Using a Secure, Continually Updating, Web Source Processing Pipeline to Support the Real-Time Data Synthesis and Analysis of Scientific Literature: Development and Validation Study." Journal of Medical Internet Research 23, no. 5 (May 6, 2021): e25714. http://dx.doi.org/10.2196/25714.
Full textFu, Yanxia, Yanli Ren, Guorui Feng, Xinpeng Zhang, and Chuan Qin. "Non-Interactive and Secure Data Aggregation Scheme for Internet of Things." Electronics 10, no. 20 (October 11, 2021): 2464. http://dx.doi.org/10.3390/electronics10202464.
Full textRehman, Amjad, Khalid Haseeb, Tanzila Saba, Jaime Lloret, and Usman Tariq. "Secured Big Data Analytics for Decision-Oriented Medical System Using Internet of Things." Electronics 10, no. 11 (May 27, 2021): 1273. http://dx.doi.org/10.3390/electronics10111273.
Full textWang, Jing, Libing Wu, Sherali Zeadally, Muhammad Khurram Khan, and Debiao He. "Privacy-preserving Data Aggregation against Malicious Data Mining Attack for IoT-enabled Smart Grid." ACM Transactions on Sensor Networks 17, no. 3 (June 21, 2021): 1–25. http://dx.doi.org/10.1145/3440249.
Full textSajid, Faiqa, Muhammad Abul Hassan, Ayaz Ali Khan, Muhammad Rizwan, Natalia Kryvinska, Karovič Vincent, and Inam Ullah Khan. "Secure and Efficient Data Storage Operations by Using Intelligent Classification Technique and RSA Algorithm in IoT-Based Cloud Computing." Scientific Programming 2022 (April 14, 2022): 1–10. http://dx.doi.org/10.1155/2022/2195646.
Full textLi, Jia, and Jie Zhang. "Privacy-Preserving Sports Wearable Data Fusion Framework." Computational Intelligence and Neuroscience 2022 (May 4, 2022): 1–7. http://dx.doi.org/10.1155/2022/6131971.
Full textVidal, Ivan, Borja Nogales, Diego Lopez, Juan Rodríguez, Francisco Valera, and Arturo Azcorra. "A Secure Link-Layer Connectivity Platform for Multi-Site NFV Services." Electronics 10, no. 15 (August 3, 2021): 1868. http://dx.doi.org/10.3390/electronics10151868.
Full textMarcos, Carlos, Arturo González-Ferrer, Mor Peleg, and Carlos Cavero. "Solving the interoperability challenge of a distributed complex patient guidance system: a data integrator based on HL7’s Virtual Medical Record standard." Journal of the American Medical Informatics Association 22, no. 3 (April 16, 2015): 587–99. http://dx.doi.org/10.1093/jamia/ocv003.
Full textMadan, Suman, and Puneet Goswami. "A Technique for Securing Big Data Using K-Anonymization With a Hybrid Optimization Algorithm." International Journal of Operations Research and Information Systems 12, no. 4 (October 2021): 1–21. http://dx.doi.org/10.4018/ijoris.20211001.oa3.
Full textTually, Peter, Johan Janssen, Simon Cowell, and John Walker. "A preliminary assessment of Internet-based nuclear telecardiology to support the clinical management of cardiac disease in a remote community." Journal of Telemedicine and Telecare 9, no. 1_suppl (June 2003): 69–71. http://dx.doi.org/10.1258/135763303322196411.
Full textHanisah Kamaruzaman, Siti, Wan Nor Shuhadah Wan Nik, Mohamad Afendee Mohamed, and Zarina Mohamad. "Design and Implementation of Data-at-Rest Encryption for Hadoop." International Journal of Engineering & Technology 7, no. 2.15 (April 6, 2018): 54. http://dx.doi.org/10.14419/ijet.v7i2.15.11212.
Full textGuan, Zhitao, Jing Li, Longfei Wu, Yue Zhang, Jun Wu, and Xiaojiang Du. "Achieving Efficient and Secure Data Acquisition for Cloud-Supported Internet of Things in Smart Grid." IEEE Internet of Things Journal 4, no. 6 (December 2017): 1934–44. http://dx.doi.org/10.1109/jiot.2017.2690522.
Full textSHYU, MEI-LING, SHU-CHING CHEN, QIBIN SUN, and HEATHER YU. "OVERVIEW AND FUTURE TRENDS OF MULTIMEDIA RESEARCH FOR CONTENT ACCESS AND DISTRIBUTION." International Journal of Semantic Computing 01, no. 01 (March 2007): 29–66. http://dx.doi.org/10.1142/s1793351x07000044.
Full textJaiswal, Rajyalakshmi, Sailesh Suryanarayan Iyer, and Kavita Arora. "Intensify Assured PHR Sharing in Cloud Using Entropy Based Signature Cryptosystem." ECS Transactions 107, no. 1 (April 24, 2022): 2593–98. http://dx.doi.org/10.1149/10701.2593ecst.
Full textAbbas, Khizar, Lo’Ai A. Tawalbeh, Ahsan Rafiq, Ammar Muthanna, Ibrahim A. Elgendy, and Ahmed A. Abd El-Latif. "Convergence of Blockchain and IoT for Secure Transportation Systems in Smart Cities." Security and Communication Networks 2021 (April 22, 2021): 1–13. http://dx.doi.org/10.1155/2021/5597679.
Full textChang, Jan-Kai, Hui Fang, Christopher A. Bower, Enming Song, Xinge Yu, and John A. Rogers. "Materials and processing approaches for foundry-compatible transient electronics." Proceedings of the National Academy of Sciences 114, no. 28 (June 26, 2017): E5522—E5529. http://dx.doi.org/10.1073/pnas.1707849114.
Full textNavale, Vivek, and Matthew McAuliffe. "Long-term preservation of biomedical research data." F1000Research 7 (August 29, 2018): 1353. http://dx.doi.org/10.12688/f1000research.16015.1.
Full textMehdi, Mubarak, Muhammad Taha Ajani, Hasan Tahir, Shahzaib Tahir, Zahoor Alizai, Fawad Khan, Qaiser Riaz, and Mehdi Hussain. "PUF-Based Key Generation Scheme for Secure Group Communication Using MEMS." Electronics 10, no. 14 (July 15, 2021): 1691. http://dx.doi.org/10.3390/electronics10141691.
Full textAbdullah, Lamya, and Juan Quintero. "Sealed computation: a mechanism to support privacy-aware trustworthy cloud service." Information & Computer Security 27, no. 5 (November 11, 2019): 601–20. http://dx.doi.org/10.1108/ics-11-2018-0133.
Full textNedeljković, Dušan, Živana Jakovljević, Zoran Miljković, and Miroslav Pajić. "Detection of cyber-attacks in systems with distributed control based on support vector regression." Telfor Journal 12, no. 2 (2020): 104–9. http://dx.doi.org/10.5937/telfor2002104n.
Full textKaushik, Shweta, and Charu Gandhi. "Capability Based Outsourced Data Access Control with Assured File Deletion and Efficient Revocation with Trust Factor in Cloud Computing." International Journal of Cloud Applications and Computing 10, no. 1 (January 2020): 64–84. http://dx.doi.org/10.4018/ijcac.2020010105.
Full textSarajcev, Petar, Antonijo Kunac, Goran Petrovic, and Marin Despalatovic. "Power System Transient Stability Assessment Using Stacked Autoencoder and Voting Ensemble." Energies 14, no. 11 (May 27, 2021): 3148. http://dx.doi.org/10.3390/en14113148.
Full textKamaliah, Naily, and Alpha Fadila Juliana Rahman. "Menjaga Kualitas Pembelajaran Praktikum Pengolahan Data Secara Daring pada Mata Pelatihan Analisis dan Interpretasi Data." Andragogi: Jurnal Diklat Teknis Pendidikan dan Keagamaan 9, no. 1 (September 13, 2021): 24–32. http://dx.doi.org/10.36052/andragogi.v9i1.208.
Full textTene Koyazo, Jacques, Moise Avoci Ugwiri, Aimé Lay-Ekuakille, Maria Fazio, Massimo Villari, and Consolatina Liguori. "Collaborative systems for telemedicine diagnosis accuracy." ACTA IMEKO 10, no. 3 (September 30, 2021): 192. http://dx.doi.org/10.21014/acta_imeko.v10i3.1133.
Full textMao, Jian, Wenqian Tian, Yan Zhang, Jian Cui, Hanjun Ma, Jingdong Bian, Jianwei Liu, and Jianhong Zhang. "Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/2948025.
Full textAleksandrov, Mitko, Sisi Zlatanova, and David J. Heslop. "Voxelisation Algorithms and Data Structures: A Review." Sensors 21, no. 24 (December 9, 2021): 8241. http://dx.doi.org/10.3390/s21248241.
Full textPatel, Rashmi, Soon Nan Wee, Rajagopalan Ramaswamy, Simran Thadani, Jesisca Tandi, Ruchir Garg, Nathan Calvanese, et al. "NeuroBlu, an electronic health record (EHR) trusted research environment (TRE) to support mental healthcare analytics with real-world data." BMJ Open 12, no. 4 (April 2022): e057227. http://dx.doi.org/10.1136/bmjopen-2021-057227.
Full textBecker, Christoph, Luis Faria, and Kresimir Duretec. "Scalable decision support for digital preservation: an assessment." OCLC Systems & Services: International digital library perspectives 31, no. 1 (February 9, 2015): 11–34. http://dx.doi.org/10.1108/oclc-06-2014-0026.
Full text