Loading…
A Cryptographic Approach to Securely Share and Query Genomic Sequences
Kantarcioglu, M., Wei Jiang, Ying Liu, Malin, B.
Published in IEEE transactions on information technology in biomedicine (01.09.2008)
Published in IEEE transactions on information technology in biomedicine (01.09.2008)
Get full text
Journal Article
Loading…
Loading…
Loading…
An empirical assessment of seaports as facilitators of FOC-flagged transshipment landings
Petrossian, Gohar A., Pires, Stephen F., Spencer, M. Dylan, Cohen, Noah D.
Published in Crime science (01.12.2024)
Published in Crime science (01.12.2024)
Get full text
Journal Article
Loading…
Statistical en-route filtering of injected false data in sensor networks
Fan Ye, Luo, H., Songwu Lu, Lixia Zhang
Published in IEEE journal on selected areas in communications (01.04.2005)
Published in IEEE journal on selected areas in communications (01.04.2005)
Get full text
Journal Article
Loading…
Loading…
Data security across data residency restriction boundaries
Cheng, Karen, Riley, Daniel S, Rudden, Mary E, Lam, Thanh, Trim, Craig M
Year of Publication 26.12.2023
Get full text
Year of Publication 26.12.2023
Patent
Loading…
Loading…
DeepChain: A Deep Learning and Blockchain Based Framework for Detecting Risky Transactions on HIE System
Merhej, Joseph, Harb, Hassan, Abouaissa, Abdelhafid, Idoumghar, Lhassane
Published in 2023 IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE) (14.12.2023)
Published in 2023 IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE) (14.12.2023)
Get full text
Conference Proceeding
Loading…
If the legislature had been serious about data privacy
Kuner, Christopher, Cate, Fred H, Lynskey, Orla, Millard, Christopher, Ni Loideain, Nora, Svantesson, Dan Jerker B
Published in International data privacy law (01.05.2019)
Published in International data privacy law (01.05.2019)
Get full text
Journal Article
Loading…
Loading…
Data Security and Privacy using DNA Cryptography and AES Method in Cloud Computing
Kumar, Anuj
Published in International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (Online) (11.11.2021)
Published in International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (Online) (11.11.2021)
Get full text
Conference Proceeding
Loading…
Effects of factor v Leiden polymorphism on the pathogenesis and outcomes of preeclampsia
Ababio, G. K., Adu-Bonsaffoh, K., Abindau, E., Narh, G., Tetteh, D., Botchway, F., Morvey, D., Neequaye, J., Quaye, I. K.
Published in BMC medical genetics (27.11.2019)
Published in BMC medical genetics (27.11.2019)
Get full text
Journal Article
Loading…
Security Quantification of Container-Technology-Driven E-Government Systems
Mondal, Subrota Kumar, Tan, Tian, Khanam, Sadia, Kumar, Keshav, Kabir, Hussain Mohammed Dipu, Ni, Kan
Published in Electronics (Basel) (01.03.2023)
Published in Electronics (Basel) (01.03.2023)
Get full text
Journal Article
Loading…
Loading…
Science of Cyber Security: Third International Conference, SciSec 2021, Virtual Event, August 13–15, 2021, Revised Selected Papers
Year of Publication 02.12.2021
Get full text
Conference Proceeding
Loading…
Loading…
A SCIENTIFIC APPROACH TO TECH ACCOUNTABILITY
Choffnes, David, Hartzog, Woodrow, Jordan, Scott, Markopoulou, Athina, Shafiq, Zubair
Published in Harvard journal of law & technology (22.06.2023)
Get full text
Published in Harvard journal of law & technology (22.06.2023)
Journal Article