期刊文献+
共找到6,385篇文章
< 1 2 250 >
每页显示 20 50 100
Quantum Secure Multiparty Computation:Bridging Privacy,Security,and Scalability in the Post-Quantum Era
1
作者 Sghaier Guizani Tehseen Mazhar Habib Hamam 《Computers, Materials & Continua》 2026年第4期1-25,共25页
The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreser... The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreserving computation.Classical MPC relies on cryptographic techniques such as homomorphic encryption,secret sharing,and oblivious transfer,which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries.This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI,IEEE Explore,Springer,and Elsevier,examining the applications,types,and security issues with the solution of Quantum computing in different fields.This review explores the impact of quantum computing on MPC security,assesses emerging quantum-resistant MPC protocols,and examines hybrid classicalquantum approaches aimed at mitigating quantum threats.We analyze the role of Quantum Key Distribution(QKD),post-quantum cryptography(PQC),and quantum homomorphic encryption in securing multiparty computations.Additionally,we discuss the challenges of scalability,computational efficiency,and practical deployment of quantumsecure MPC frameworks in real-world applications such as privacy-preserving AI,secure blockchain transactions,and confidential data analysis.This review provides insights into the future research directions and open challenges in ensuring secure,scalable,and quantum-resistant multiparty computation. 展开更多
关键词 Quantum computing secure multiparty computation(MPC) post-quantum cryptography(PQC) quantum key distribution(QKD) privacy-preserving computation quantum homomorphic encryption quantum network security federated learning blockchain security quantum cryptography
在线阅读 下载PDF
Design and implementation of a computer endpoint security baseline verification system based on MLPS 2.0
2
作者 Fan Miao YaQiong Xu +3 位作者 ZiYang Wan YingJie Zhuang Yang Li JiaPeng Ren 《Railway Sciences》 2026年第1期136-152,共17页
Purpose-Amidst an increasingly severe cybersecurity landscape,the widespread adoption of Xinchuang endpoints has become a strategic imperative.Governments and enterprises have established terminal localization as a cr... Purpose-Amidst an increasingly severe cybersecurity landscape,the widespread adoption of Xinchuang endpoints has become a strategic imperative.Governments and enterprises have established terminal localization as a critical objective,aiming for comprehensive indigenous replacement through rapid technological iteration.Consequently,Xinchuang systems and Windows platforms are expected to coexist over an extended period.This study seeks to establish an automated verification framework for multi-version operating systems and validate the efficacy of baseline hardening in mitigating security risks.Design/methodology/approach-Based on the Classified Protection 2.0 framework and relevant national standards for endpoint security,this study proposes an endpoint security baseline verification scheme applicable to multiple operating systems.The scheme addresses divergent security policies and implementation methodologies across heterogeneous environments.It automates the inspection of core baselines,including account password complexity,default shared service status and patch installation status.Furthermore,a comprehensive scoring model is established by incorporating differentiated weights for account security,patch management and log auditing,ultimately generating visualized risk reports to facilitate remediation prioritization.Findings-This study reveals that baseline configuration serves as the fundamental prerequisite in endpoint security practices.Through a scalable detection engine and quantitative scoring model,the system can promptly identify and remediate potential risks,thereby reducing the attack surface and mitigating intrusion risks.However,on certain domestic chip architectures,compatibility issues persist in detecting specific configuration items.Further improvement in hardware-software co-adaptation for domestic platforms is required to advance the development of localized security protection systems.Originality/value-Through in-depth research on security baseline configurations across multiple operating systems,this study implements an automated and visualized baseline verification methodology.This approach significantly strengthens the security posture of domestic operating systems and supports the establishment of a more robust,national-level cybersecurity defense framework. 展开更多
关键词 Windows security baseline Endpoint security Baseline inspection Xinchuang system security baseline
在线阅读 下载PDF
Intrusion Detection and Security Attacks Mitigation in Smart Cities with Integration of Human-Computer Interaction
3
作者 Abeer Alnuaim 《Computers, Materials & Continua》 2026年第1期711-743,共33页
The rapid digitalization of urban infrastructure has made smart cities increasingly vulnerable to sophisticated cyber threats.In the evolving landscape of cybersecurity,the efficacy of Intrusion Detection Systems(IDS)... The rapid digitalization of urban infrastructure has made smart cities increasingly vulnerable to sophisticated cyber threats.In the evolving landscape of cybersecurity,the efficacy of Intrusion Detection Systems(IDS)is increasingly measured by technical performance,operational usability,and adaptability.This study introduces and rigorously evaluates a Human-Computer Interaction(HCI)-Integrated IDS with the utilization of Convolutional Neural Network(CNN),CNN-Long Short Term Memory(LSTM),and Random Forest(RF)against both a Baseline Machine Learning(ML)and a Traditional IDS model,through an extensive experimental framework encompassing many performance metrics,including detection latency,accuracy,alert prioritization,classification errors,system throughput,usability,ROC-AUC,precision-recall,confusion matrix analysis,and statistical accuracy measures.Our findings consistently demonstrate the superiority of the HCI-Integrated approach utilizing three major datasets(CICIDS 2017,KDD Cup 1999,and UNSW-NB15).Experimental results indicate that the HCI-Integrated model outperforms its counterparts,achieving an AUC-ROC of 0.99,a precision of 0.93,and a recall of 0.96,while maintaining the lowest false positive rate(0.03)and the fastest detection time(~1.5 s).These findings validate the efficacy of incorporating HCI to enhance anomaly detection capabilities,improve responsiveness,and reduce alert fatigue in critical smart city applications.It achieves markedly lower detection times,higher accuracy across all threat categories,reduced false positive and false negative rates,and enhanced system throughput under concurrent load conditions.The HCIIntegrated IDS excels in alert contextualization and prioritization,offering more actionable insights while minimizing analyst fatigue.Usability feedback underscores increased analyst confidence and operational clarity,reinforcing the importance of user-centered design.These results collectively position the HCI-Integrated IDS as a highly effective,scalable,and human-aligned solution for modern threat detection environments. 展开更多
关键词 Anomaly detection smart cities Internet of Things(IoT) HCI CNN LSTM random forest intelligent secure solutions
在线阅读 下载PDF
Secure Rate Maximization for UAV-RIS-Aided IoT Network in Smart Grid
4
作者 Jian Wu Xiaowei Hao Chao Han 《Energy Engineering》 2026年第3期215-231,共17页
Owing to the development of communication technologies and control systems,the integration of numerous Internet of Things(IoT)nodes into the power grid has become increasingly prevalent.These nodes are deployed to gat... Owing to the development of communication technologies and control systems,the integration of numerous Internet of Things(IoT)nodes into the power grid has become increasingly prevalent.These nodes are deployed to gather operational data from various distributed energy sources and monitor real-time energy consumption,thereby transforming the traditional power grid into a smart grid(SG).However,the openness of wireless communication channels introduces vulnerabilities,as it allows potential eavesdroppers to intercept sensitive information.This poses threats to the secure and efficient operation of the IoT-driven smart grid.To address these challenges,we propose a novel scenario that incorporates an Unmanned Aerial Vehicle(UAV)as a relay gateway for multiple authorized smart meters.This scenario is further enhanced by the integration of Reconfigurable Intelligent Surface(RIS)technology,which dynamically adjusts the direction of information transmission.Our objective is to maximize the secure rate within this UAV-RIS-aided system with multiple authorized smart meters and an eavesdropper based on physical layer security(PLS)techniques.We formulate the problem of secure rate maximization by jointly optimizing the active beamforming of the UAV,the passive beamforming of the RIS,and the UAV’s trajectory.To solve this complex optimization problem,we introduce the Twin Soft Actor-Critic(TSAC)algorithm.This algorithm employs a dual-agent framework,where Agent 1 focuses on optimizing the beamforming for both the UAV and the RIS,while Agent 2 concurrently searches for the optimal trajectory of the UAV.Simulation results demonstrate the TSAC algorithm significantly enhances the secure rate of the system,achieving faster convergence and higher rewards under the worst communication conditions.The TSAC algorithm consistently outperforms the Twin Deep Deterministic Policy Gradient(TDDPG)and Twin Delayed Deep Deterministic Policy Gradient(TTD3)algorithms.Furthermore,the TSAC algorithm exhibits robust performance when the distribution of smart meters follows a Gaussian distribution,further validating its practical applicability and effectiveness in real-world scenarios. 展开更多
关键词 Smart grid Internet of Things unmanned aerial vehicles reconfigurable intelligent surface EAVESDROPPER secure capacity
在线阅读 下载PDF
A Novel Signature-Based Secure Intrusion Detection for Smart Transportation Systems
5
作者 Hanaa Nafea Awais Qasim +3 位作者 Sana Abdul Sattar Adeel Munawar Muhammad Nadeem Ali Byung-Seo Kim 《Computers, Materials & Continua》 2026年第3期1309-1324,共16页
The increased connectivity and reliance on digital technologies have exposed smart transportation systems to various cyber threats,making intrusion detection a critical aspect of ensuring their secure operation.Tradit... The increased connectivity and reliance on digital technologies have exposed smart transportation systems to various cyber threats,making intrusion detection a critical aspect of ensuring their secure operation.Traditional intrusion detection systems have limitations in terms of centralized architecture,lack of transparency,and vulnerability to single points of failure.This is where the integration of blockchain technology with signature-based intrusion detection can provide a robust and decentralized solution for securing smart transportation systems.This study tackles the issue of database manipulation attacks in smart transportation networks by proposing a signaturebased intrusion detection system.The introduced signature facilitates accurate detection and systematic classification of attacks,enabling categorization according to their severity levels within the transportation infrastructure.Through comparative analysis,the research demonstrates that the blockchain-based IDS outperforms traditional approaches in terms of security,resilience,and data integrity. 展开更多
关键词 Smart transportation intrusion detection network security blockchain smart contract
在线阅读 下载PDF
Mitigating Adversarial Obfuscation in Named Entity Recognition with Robust Secure BERT Finetuning
6
作者 Nouman Ahmad Changsheng Zhang Uroosa Sehar 《Computers, Materials & Continua》 2026年第4期860-876,共17页
Although Named Entity Recognition(NER)in cybersecurity has historically concentrated on threat intelligence,vital security data can be found in a variety of sources,such as open-source intelligence and unprocessed too... Although Named Entity Recognition(NER)in cybersecurity has historically concentrated on threat intelligence,vital security data can be found in a variety of sources,such as open-source intelligence and unprocessed tool outputs.When dealing with technical language,the coexistence of structured and unstructured data poses serious issues for traditional BERT-based techniques.We introduce a three-phase approach for improved NER inmulti-source cybersecurity data that makes use of large language models(LLMs).To ensure thorough entity coverage,our method starts with an identification module that uses dynamic prompting techniques.To lessen hallucinations,the extraction module uses confidence-based self-assessment and cross-checking using regex validation.The tagging module links to knowledge bases for contextual validation and uses SecureBERT in conjunction with conditional random fields to detect entity boundaries precisely.Our framework creates efficient natural language segments by utilizing decoderbased LLMs with 10B parameters.When compared to baseline SecureBERT implementations,evaluation across four cybersecurity data sources shows notable gains,with a 9.4%–25.21%greater recall and a 6.38%–17.3%better F1-score.Our refined model matches larger models and achieves 2.6%–4.9%better F1-score for technical phrase recognition than the state-of-the-art alternatives Claude 3.5 Sonnet,Llama3-8B,and Mixtral-7B.The three-stage architecture identification-extraction-tagging pipeline tackles important cybersecurity NER issues.Through effective architectures,these developments preserve deployability while setting a new standard for entity extraction in challenging security scenarios.The findings show how specific enhancements in hybrid recognition,validation procedures,and prompt engineering raise NER performance above monolithic LLM approaches in cybersecurity applications,especially for technical entity extraction fromheterogeneous sourceswhere conventional techniques fall short.Because of itsmodular nature,the framework can be upgraded at the component level as new methods are developed. 展开更多
关键词 Information extraction large language models NER open-source intelligence security automation
在线阅读 下载PDF
A secure mist-fog-assisted cooperative offloading framework for sustainable smart city development
7
作者 Subhranshu Sekhar Tripathy Sujit Bebortta +3 位作者 Mazin Abed Mohammed Muhammet Deveci Haydar Abdulameer Marhoon Radek Martinek 《Digital Communications and Networks》 2026年第1期165-179,共15页
Practical applications of smart cities and the Internet of Things(IoT)have multiplied,posing many difficulties in network performance,dependability,and security.Concerns of accessibility,reliability,sustainability,and... Practical applications of smart cities and the Internet of Things(IoT)have multiplied,posing many difficulties in network performance,dependability,and security.Concerns of accessibility,reliability,sustainability,and security too have arisen correspondingly because of the decentralized character of the smart city and IoT systems.Fog computing offers a foundation for various applications,including cognitive support,health and social services,intelligent transportation systems,and pervasive computing and communications.Fog computing can help enhance these apps'productivity and lower the end-to-end delay experienced by such time-sensitive applications.In this research,we propose a reliable and secure service delivery strategy at the network edge for smart cities.To improve the availability and dependability,along with the security of smart city applications,the approach employs a combined method uniting distributed fog servers in addition to mist servers with the help of an intrusion detection system.Simulation findings suggest a reduction of 40.3%in the delay incurred by each service request for highly dense areas and 60.6%for moderately dense environments.Furthermore,the system has low false-negative rates and high detection and accuracy rates,decreasing service requests 2%. 展开更多
关键词 Security Reliability Trustworthy computing Resource provisioning Threat detection Fog computing Internet of things
在线阅读 下载PDF
Framework for Secure Substitution Box Construction and Its Application in Image Encryption
8
作者 Umar Hayat Ikram Ullah Muhammad Bilal 《Computers, Materials & Continua》 2026年第4期1428-1462,共35页
Elliptic curve(EC)based cryptosystems gained more attention due to enhanced security than the existing public key cryptosystems.A substitution box(S-box)plays a vital role in securing modern symmetric key cryptosystem... Elliptic curve(EC)based cryptosystems gained more attention due to enhanced security than the existing public key cryptosystems.A substitution box(S-box)plays a vital role in securing modern symmetric key cryptosystems.However,the recently developed EC based algorithms usually trade off between computational efficiency and security,necessitating the design of a new algorithm with the desired cryptographic strength.To address these shortcomings,this paper proposes a new scheme based onMordell elliptic curve(MEC)over the complex field for generating distinct,dynamic,and highly uncorrelated S-boxes.Furthermore,we count the exact number of the obtained S-boxes,and demonstrate that the permuted version of the presented S-box is statistically optimal.The nonsingularity of the presented algorithm and the injectivity of the resultant output are explored.Rigorous theoretical analysis and experimental results demonstrate that the proposedmethod is highly effective in generating a large number of dynamic S-boxes with adequate cryptographic properties,surpassing current state-of-the-art S-box generation algorithms in terms of security.Apart fromthis,the generated S-box is benchmarked using side-channel attacks,and its performance is compared with highly nonlinear S-boxes,demonstrating comparable results.In addition,we present an application of our proposed S-box generator by incorporating it into an image encryption technique.The encrypted and decrypted images are tested by employing extensive standard security metrics,including the Number of Pixel Change Rate,the Unified Average Changing Intensity,information entropy,correlation coefficient,and histogram analysis.Moreover,the analysis is extended beyond conventional metrics to validate the new method using advanced tests,such as the NIST statistical test suite,robustness analysis,and noise and cropping attacks.Experimental outcomes show that the presented algorithm strengthens the existing encryption scheme against various well-known cryptographic attacks. 展开更多
关键词 Substitution box Mordell elliptic curve Mobius transformation NONLINEARITY image encryption CRYPTANALYSIS data security
在线阅读 下载PDF
Robust UAV-Assisted Jamming Secure Performance Improvement for Cognitive UAV Networks:Joint Resource Allocation and Trajectory Design
9
作者 Sun Ruomei Wu Yuhang +2 位作者 Tao Zhenhui Zhou Fuhui Wu Qihui 《China Communications》 2026年第2期137-149,共13页
Cognitive unmanned aerial vehicle(UAV)is promising to tackle the spectrum scarcity problem faced by UAV communications.However,the secure information transmission is challenging due to the open nature of the spectrum ... Cognitive unmanned aerial vehicle(UAV)is promising to tackle the spectrum scarcity problem faced by UAV communications.However,the secure information transmission is challenging due to the open nature of the spectrum sharing.In order to tackle this issue,a cognitive UAV network with cooperative jamming is studied in this paper.A robust resource allocation and trajectory joint optimization problem is formulated by considering the practical case that the channel state information(CSI)cannot be accurately obtained.An iterative algorithm is proposed to address this challenging non-convex problem.Simulation results demonstrate that the worst case robust resource allocation design can realize the secure communications even under the imperfect CSI.Moreover,compared with other benchmark schemes,the proposed scheme can achieve secure performance improvement. 展开更多
关键词 cognitive radio physical layer security robust design UAV communications
在线阅读 下载PDF
A Comprehensive Survey on Blockchain-Enabled Techniques and Federated Learning for Secure 5G/6G Networks:Challenges,Opportunities,and Future Directions
10
作者 Muhammad Asim Abdelhamied A.Ateya +4 位作者 Mudasir Ahmad Wani Gauhar Ali Mohammed ElAffendi Ahmed A.Abd El-Latif Reshma Siyal 《Computers, Materials & Continua》 2026年第3期117-161,共45页
The growing developments in 5G and 6G wireless communications have revolutionized communications technologies,providing faster speeds with reduced latency and improved connectivity to users.However,it raises significa... The growing developments in 5G and 6G wireless communications have revolutionized communications technologies,providing faster speeds with reduced latency and improved connectivity to users.However,it raises significant security challenges,including impersonation threats,data manipulation,distributed denial of service(DDoS)attacks,and privacy breaches.Traditional security measures are inadequate due to the decentralized and dynamic nature of next-generation networks.This survey provides a comprehensive review of how Federated Learning(FL),Blockchain,and Digital Twin(DT)technologies can collectively enhance the security of 5G and 6G systems.Blockchain offers decentralized,immutable,and transparent mechanisms for securing network transactions,while FL enables privacy-preserving collaborative learning without sharing raw data.Digital Twins create virtual replicas of network components,enabling real-time monitoring,anomaly detection,and predictive threat analysis.The survey examines major security issues in emerging wireless architectures and analyzes recent advancements that integrate FL,Blockchain,and DT to mitigate these threats.Additionally,it presents practical use cases,synthesizes key lessons learned,and identifies ongoing research challenges.Finally,the survey outlines future research directions to support the development of scalable,intelligent,and robust security frameworks for next-generation wireless networks. 展开更多
关键词 5G/6G blockchain federated learning edge computing security
在线阅读 下载PDF
Secured-FL:Blockchain-Based Defense against Adversarial Attacks on Federated Learning Models
11
作者 Bello Musa Yakubu Nor Shahida Mohd Jamail +1 位作者 Rabia Latif Seemab Latif 《Computers, Materials & Continua》 2026年第3期734-757,共24页
Federated Learning(FL)enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection.This work pr... Federated Learning(FL)enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection.This work proposes Secured-FL,a blockchain-based defensive framework that combines smart contract-based authentication,clustering-driven outlier elimination,and dynamic threshold adjustment to defend against adversarial attacks.The framework was implemented on a private Ethereum network with a Proof-of-Authority consensus algorithm to ensure tamper-resistant and auditable model updates.Large-scale simulation on the Cyber Data dataset,under up to 50%malicious client settings,demonstrates Secured-FL achieves 6%-12%higher accuracy,9%-15%lower latency,and approximately 14%less computational expense compared to the PPSS benchmark framework.Additional tests,including confusion matrices,ROC and Precision-Recall curves,and ablation tests,confirm the interpretability and robustness of the defense.Tests for scalability also show consistent performance up to 500 clients,affirming appropriateness to reasonably large deployments.These results make Secured-FL a feasible,adversarially resilient FL paradigm with promising potential for application in smart cities,medicine,and other mission-critical IoT deployments. 展开更多
关键词 Federated learning(FL) blockchain FL based privacy model defense FL model security ethereum smart contract
在线阅读 下载PDF
Quantum-Resistant Secure Aggregation for Healthcare Federated Learning
12
作者 Chia-Hui Liu Zhen-Yu Wu 《Computers, Materials & Continua》 2026年第5期2116-2137,共22页
ABSTRACT:Federated Learning(FL)enables collaborative medical model training without sharing sensitive patient data.However,existing FL systems face increasing security risks from post quantum adversaries and often inc... ABSTRACT:Federated Learning(FL)enables collaborative medical model training without sharing sensitive patient data.However,existing FL systems face increasing security risks from post quantum adversaries and often incur nonnegligible computational and communication overhead when encryption is applied.At the same time,training high performance AI models requires large volumes of high quality data,while medical data such as patient information,clinical records,and diagnostic reports are highly sensitive and subject to strict privacy regulations,including HIPAA and GDPR.Traditional centralized machine learning approaches therefore pose significant challenges for cross institutional collaboration in healthcare.To address these limitations,Federated Learning was introduced to allow multiple institutions to jointly train a global model while keeping local data private.Nevertheless,conventional cryptographicmechanisms,such as RSA,are increasingly inadequate for privacy sensitive FL deployments,particularly in the presence of emerging quantum computing threats.Homomorphic encryption,which enables computations to be performed directly on encrypted data,provides an effective solution for preserving data privacy in federated learning systems.This capability allows healthcare institutions to securely perform collaborative model training while remaining compliant with regulatory requirements.Among homomorphic encryption techniques,NTRU,a lattice based cryptographic scheme defined over polynomial rings,offers strong resistance against quantum attacks by relying on the hardness of the Shortest Vector Problem(SVP).Moreover,NTRU supports limited homomorphic operations that are sufficient for secure aggregation in federated learning.In this work,we propose an NTRU enhanced federated learning framework specifically designed for medical and healthcare applications.Experimental results demonstrate that the proposed approach achieves classification performance comparable to standard federated learning,with final accuracy consistently exceeding 0.93.The framework introduces predictable encryption latency on the order of hundreds of milliseconds per training round and a fixed ciphertext communication overhead per client under practical deployment settings.In addition,the proposed systemeffectivelymitigatesmultiple security threats,including quantum computing attacks,by ensuring robust encryption throughout the training process.By integrating the security and homomorphic properties of NTRU,this study establishes a privacy preserving and quantumresistant federated learning framework that supports the secure,legal,and efficient deployment of AI technologies in healthcare,thereby laying a solid foundation for future intelligent healthcare systems. 展开更多
关键词 Federated learning(FL) homomorphic encryption NTRU cryptography healthcare data privacy quantum-resistant security
在线阅读 下载PDF
A Blockchain-Based Hybrid Framework for Secure and Scalable Electronic Health Record Management in In-Patient Follow-Up Tracking
13
作者 Ahsan Habib Siam Md.Ehsanul Haque +3 位作者 Fahmid Al Farid Anindita Sutradhar Jia Uddin Sarina Mansor 《Computers, Materials & Continua》 2026年第3期798-822,共25页
As healthcare systems increasingly embrace digitalization,effective management of electronic health records(EHRs)has emerged as a critical priority,particularly in inpatient settings where data sensitivity and realtim... As healthcare systems increasingly embrace digitalization,effective management of electronic health records(EHRs)has emerged as a critical priority,particularly in inpatient settings where data sensitivity and realtime access are paramount.Traditional EHR systems face significant challenges,including unauthorized access,data breaches,and inefficiencies in tracking follow-up appointments,which heighten the risk of misdiagnosis and medication errors.To address these issues,this research proposes a hybrid blockchain-based solution for securely managing EHRs,specifically designed as a framework for tracking inpatient follow-ups.By integrating QR codeenabled data access with a blockchain architecture,this innovative approach enhances privacy protection,data integrity,and auditing capabilities,while facilitating swift and real-time data retrieval.The architecture adheres to Role-Based Access Control(RBAC)principles and utilizes robust encryption techniques,including SHA-256 and AES-256-CBC,to secure sensitive information.A comprehensive threat model outlines trust boundaries and potential adversaries,complemented by a validated data transmission protocol.Experimental results demonstrate that the framework remains reliable in concurrent access scenarios,highlighting its efficiency and responsiveness in real-world applications.This study emphasizes the necessity for hybrid solutions in managing sensitive medical information and advocates for integrating blockchain technology and QR code innovations into contemporary healthcare systems. 展开更多
关键词 Electronic health records blockchain data security user access control QR code blockchain in healthcare medical data privacy
在线阅读 下载PDF
基于行动研究法的SECURE护理路径预防医疗器械压力性损伤研究 被引量:2
14
作者 刘立天 赵文利 +5 位作者 宋学莲 郑肖林 李英肖 李玉 张磊 张飞飞 《中国医学装备》 2025年第1期90-95,共6页
目的:探究基于行动研究法的皮肤和(或)组织、教育、合作、理解、报告和评价(SECURE)护理路径在重症监护室(ICU)患者医疗器械相关压力性损伤(MDRPI)预防过程中的应用效果。方法:基于行动研究法的SECURE护理路径包括成立皮肤护理小组发现... 目的:探究基于行动研究法的皮肤和(或)组织、教育、合作、理解、报告和评价(SECURE)护理路径在重症监护室(ICU)患者医疗器械相关压力性损伤(MDRPI)预防过程中的应用效果。方法:基于行动研究法的SECURE护理路径包括成立皮肤护理小组发现问题、制定干预计划实施和开展针对性护理干预预防MDRPI发生。选取2022年3月至2023年3月河北省人民医院ICU住院治疗的84例患者,按照随机数表法将其分为对照组和观察组,每组42例,对照组患者ICU治疗期间开展常规方式预防MDRPI,观察组采用行动研究法的SECURE护理路径开展预防。对比两组患者MDRPI发生率、ICU护理质量评分、患者生活质量简表-36(SF-36)评分、MDRPI患者改善情况评估及患者护理满意度。结果:观察组患者ICU治疗期间MDRPI发生率为4.76%(2/42),低于对照组的14.29%(6/42),差异有统计学意义(χ^(2)=11.052,P<0.05);观察组患者护理干预后的设备使用、预防评估、体位管理和预防护理平均评分分别为(88.45±2.05)、(89.36±2.11)、(89.25±2.15)和(91.45±2.25)分,均高于对照组,差异有统计学意义(t=11.425、12.052、10.052、13.478,P<0.05);观察组患者护理干预后SF-36量表的躯体功能、社会功能、心理功能和物质生活平均评分分别为(85.47±2.05)、(86.48±2.05)、(88.46±2.15)和(90.25±2.44)分,均高于对照组,差异有统计学意义(t=12.414、11.045、10.252、10.478,P<0.05);观察组患者MDRPI的发生时间、创面改善时间和ICU治疗时间分别为(4.05±0.54)、(3.45±0.15)和(8.12±2.14)d,发生时间多于对照组,而创面改善时间和ICU治疗时间少于对照组,差异有统计学意义(t=8.485、10.012、13.001,P<0.05);观察组患者的护理满意度为95.24%(40/42),高于对照组的83.33%(35/42),差异有统计学意义(χ^(2)=12.054,P<0.05)。结论:基于行动研究法的SECURE护理路径对ICU患者MDRPI预防进行干预,能够降低ICU患者MDRPI发生率,提升MDRPI护理工作质量,缩短ICU治疗时间,有助于ICU患者康复。 展开更多
关键词 行动研究法 secure护理路径 重症监护室(ICU)患者 医疗器械相关压力性损伤(MDRPI) 预防
暂未订购
An Effective and Secure Quality Assurance System for a Computer Science Program 被引量:1
15
作者 Mohammad Alkhatib 《Computer Systems Science & Engineering》 SCIE EI 2022年第6期975-995,共21页
Improving the quality assurance (QA) processes and acquiring accreditation are top priorities for academic programs. The learning outcomes (LOs)assessment and continuous quality improvement represent core components o... Improving the quality assurance (QA) processes and acquiring accreditation are top priorities for academic programs. The learning outcomes (LOs)assessment and continuous quality improvement represent core components ofthe quality assurance system (QAS). Current assessment methods suffer deficiencies related to accuracy and reliability, and they lack well-organized processes forcontinuous improvement planning. Moreover, the absence of automation, andintegration in QA processes forms a major obstacle towards developing efficientquality system. There is a pressing need to adopt security protocols that providerequired security services to safeguard the valuable information processed byQAS as well. This research proposes an effective methodology for LOs assessment and continuous improvement processes. The proposed approach ensuresmore accurate and reliable LOs assessment results and provides systematic wayfor utilizing those results in the continuous quality improvement. This systematicand well-specified QA processes were then utilized to model and implement automated and secure QAS that efficiently performs quality-related processes. Theproposed system adopts two security protocols that provide confidentiality, integrity, and authentication for quality data and reports. The security protocols avoidthe source repudiation, which is important in the quality reporting system. This isachieved through implementing powerful cryptographic algorithms. The QASenables efficient data collection and processing required for analysis and interpretation. It also prepares for the development of datasets that can be used in futureartificial intelligence (AI) researches to support decision making and improve thequality of academic programs. The proposed approach is implemented in a successful real case study for a computer science program. The current study servesscientific programs struggling to achieve academic accreditation, and gives rise tofully automating and integrating the QA processes and adopting modern AI andsecurity technologies to develop effective QAS. 展开更多
关键词 Quality assurance information security cryptographic algorithms education programs
在线阅读 下载PDF
Continuous-variable quantum secure direct communication based on N-APSK with Boltzmann-Maxwell distribution 被引量:1
16
作者 Zheng-Wen Cao Yu-Jie Zhang +4 位作者 Geng Chai Zhang-Tao Liang Xin-Lei Chen Lei Wang Yu-Jie Wang 《Chinese Physics B》 2025年第3期85-93,共9页
Continuous-variable quantum secure direct communication(CVQSDC)with Gaussian modulation(GM)demands a considerable quantity of random numbers during the preparation process and encodes them separately on the quadrature... Continuous-variable quantum secure direct communication(CVQSDC)with Gaussian modulation(GM)demands a considerable quantity of random numbers during the preparation process and encodes them separately on the quadrature components of the quantum states.Hence,high-speed random number generators are required to satisfy this demand,which is difficult to implement in practical applications.CVQSDC with discrete modulation(DM),correspondingly,employs a finite number of quantum states to achieve encoding,which can circumvent the shortcomings of the GM scheme.Based on the advantages of DM,the issue of attaining the most optimal secrecy capacity and communication distance remains to be resolved.Here,we propose a CVQSDC protocol based on N-symbol amplitude phase shift keying(N-APSK),which exploits the Boltzmann-Maxwell distribution assisted probability shaping technique.In comparison with the uniform distribution,according to 32-APSK CVQSDC,the proposed scheme extends the communication distance by about 38%,while obtaining a higher secrecy capacity at the same communication distance.Furthermore,increasing the value of N will concurrently increase the quantity of rings in the constellation,thereby facilitating enhancements of communication distance.This work incorporates the modulation approaches prevalently employed in classical communication into the realm of quantum communication,attaining gratifying advancements in communication distance and secrecy capacity,and concurrently facilitating the integrated development of quantum communication and classical communication. 展开更多
关键词 quantum secure direct communication discrete-modulation amplitude phase shift keying Boltzmann-Maxwell distribution
原文传递
A hybrid uplink-downlink secure transmission scheme for UAV-aided coordinated multi-point networks 被引量:1
17
作者 Xin Fan Guangkai Li +5 位作者 Jianqiang Li Yue Wang Chuanwen Luo Yi Hong Ting Chen Yan Huo 《Digital Communications and Networks》 2025年第3期925-936,共12页
Recognized as a pivotal facet in Beyond Fifth-Generation(B5G)and the upcoming Sixth-Generation(6G)wireless networks,Unmanned Aerial Vehicle(UAV)communications pose challenges due to limited capabilities when serving a... Recognized as a pivotal facet in Beyond Fifth-Generation(B5G)and the upcoming Sixth-Generation(6G)wireless networks,Unmanned Aerial Vehicle(UAV)communications pose challenges due to limited capabilities when serving as mobile base stations,leading to suboptimal service for edge users.To address this,the collaborative formation of Coordinated Multi-Point(CoMP)networks proves instrumental in alleviating the issue of the poor Quality of Service(QoS)at edge users in the network periphery.This paper introduces a groundbreaking solution,the Hybrid Uplink-Downlink Non-Orthogonal Multiple Access(HUD-NOMA)scheme for UAV-aided CoMP networks.Leveraging network coding and NOMA technology,our proposed HUD-NOMA effectively enhances transmission rates for edge users,notwithstanding a minor reduction in signal reception reliability for strong signals.Importantly,the system’s overall sum rate is elevated.The proposed HUD-NOMA demonstrates resilience against eavesdroppers by effectively managing intended interferences without the need for additional artificial noise injection.The study employs a stochastic geometry approach to derive the Secrecy Outage Probability(SOP)for the transmissions in the CoMP network,revealing superior performance in transmission rates and lower SOP compared to existing methods through numerical verification.Furthermore,guided by the theoretical SOP derivation,this paper proposes a power allocation strategy to further reduce the system’s SOP. 展开更多
关键词 NOMA UAV COMP Physical layer security Stochastic geometry approaches Secrecy outage probability
在线阅读 下载PDF
Secure Synchronization Control of Markovian Jump Neural Networks Under DoS Attacks with Memory-Based Adaptive Event-Triggered Mechanism 被引量:1
18
作者 Shanshan ZHAO Linhao ZHAO +1 位作者 Shiping WEN Long CHENG 《Artificial Intelligence Science and Engineering》 2025年第1期64-78,共15页
This paper explores the issue of secure synchronization control in piecewise-homogeneous Markovian jump delay neural networks affected by denial-of-service(DoS)attacks.Initially,a novel memory-based adaptive event-tri... This paper explores the issue of secure synchronization control in piecewise-homogeneous Markovian jump delay neural networks affected by denial-of-service(DoS)attacks.Initially,a novel memory-based adaptive event-triggered mechanism(MBAETM)is designed based on sequential growth rates,focusing on event-triggered conditions and thresholds.Subsequently,from the perspective of defenders,non-periodic DoS attacks are re-characterized,and a model of irregular DoS attacks with cyclic fluctuations within time series is further introduced to enhance the system's defense capabilities more effectively.Additionally,considering the unified demands of network security and communication efficiency,a resilient memory-based adaptive event-triggered mechanism(RMBAETM)is proposed.A unified Lyapunov-Krasovskii functional is then constructed,incorporating a loop functional to thoroughly consider information at trigger moments.The master-slave system achieves synchronization through the application of linear matrix inequality techniques.Finally,the proposed methods'effectiveness and superiority are confirmed through four numerical simulation examples. 展开更多
关键词 Piecewise-homogeneous Markovian process delay neural networks security synchronization control memory-based adaptive eventtriggered mechanism
在线阅读 下载PDF
AI-Enhanced Secure Data Aggregation for Smart Grids with Privacy Preservation
19
作者 Congcong Wang Chen Wang +1 位作者 Wenying Zheng Wei Gu 《Computers, Materials & Continua》 SCIE EI 2025年第1期799-816,共18页
As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy protection.Current research emphasizes data security and use... As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy protection.Current research emphasizes data security and user privacy concerns within smart grids.However,existing methods struggle with efficiency and security when processing large-scale data.Balancing efficient data processing with stringent privacy protection during data aggregation in smart grids remains an urgent challenge.This paper proposes an AI-based multi-type data aggregation method designed to enhance aggregation efficiency and security by standardizing and normalizing various data modalities.The approach optimizes data preprocessing,integrates Long Short-Term Memory(LSTM)networks for handling time-series data,and employs homomorphic encryption to safeguard user privacy.It also explores the application of Boneh Lynn Shacham(BLS)signatures for user authentication.The proposed scheme’s efficiency,security,and privacy protection capabilities are validated through rigorous security proofs and experimental analysis. 展开更多
关键词 Smart grid data security privacy protection artificial intelligence data aggregation
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部