Intermediary decentralized computing and private blockchain mechanisms for privacy preservation in the internet of medical things

HIGHLIGHTS

  • What: The work steps` process and approach are shown in Figure 2. In conjunction with the work of this model, the authors created a random secret key so that the outputs of the classification model are inputs to the fifth stage, which is the encryption stage utilizing AES encryption, as shown in Algorithm 3. The authors investigate the evaluation of the proposed approach from security and performance aspects and provide comparisons with recent research results ([24], ). Figure 3 shows the results of testing the approach (EASPI), where the authors design an attack-resistant system according to the . . .

     

    Logo ScioWire Beta black

    If you want to have access to all the content you need to log in!

    Thanks :)

    If you don't have an account, you can create one here.

     

Scroll to Top

Add A Knowledge Base Question !

+ = Verify Human or Spambot ?