2022
DOI: 10.1007/978-3-030-87954-9_13
|View full text |Cite
|
Sign up to set email alerts
|

Big Data Based Smart Blockchain for Information Retrieval in Privacy-Preserving Healthcare System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 35 publications
0
11
0
Order By: Relevance
“…Beyond key size, the optimization of block size in cryptographic algorithms also plays a crucial role. Research by 28 on the impact of different block sizes in AES encryption reveals that smaller block sizes can potentially increase the speed of encryption processes but may reduce security against certain types of attacks. This finding is crucial for applications where speed is as important as security, such as in real-time communication systems.…”
Section: Overview Of Cryptography Algorithms Optimizationmentioning
confidence: 99%
See 1 more Smart Citation
“…Beyond key size, the optimization of block size in cryptographic algorithms also plays a crucial role. Research by 28 on the impact of different block sizes in AES encryption reveals that smaller block sizes can potentially increase the speed of encryption processes but may reduce security against certain types of attacks. This finding is crucial for applications where speed is as important as security, such as in real-time communication systems.…”
Section: Overview Of Cryptography Algorithms Optimizationmentioning
confidence: 99%
“…Nature-inspired algorithms, exemplified by GA and PSO, draw insights from biological and natural processes. On the other hand, non-nature-inspired algorithms, like TS and SA, are grounded in mathematical and physical principles 28 . Additionally, metaheuristics can be differentiated by their search strategies, where some algorithms exploit historical information to guide their search, while others rely on probabilistic decision rules 29 .…”
Section: Literature Reviewmentioning
confidence: 99%
“…Target nodes and anchor nodes are also included in the neighbor nodes. The target node moves to the location of a nearby node, let us say node 4, and we can assume that since it is equallyclose to the anchor nodes, it is outside the triangulation area [15][16][17].…”
Section: Principle Of Apit Algorithmmentioning
confidence: 99%
“…STARTGAS: represents the max number of computational steps allowed for the transaction to execute. The data field is the key field that the contracts use to read whenever a smart contract is addressed [ 42 , 43 , 44 , 45 , 46 ]. IIoT Security Threats IIoT solutions consist of industrial systems that connect to cloud for data collection and analysis purposes.…”
Section: Background and Related Studiesmentioning
confidence: 99%
“…The second level of FN’s latency is reduced because of IoMT device communication. As a result, users’ requirements are encountered in the proposed fog computing (FC) model [ 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 ].…”
Section: Proposed Frameworkmentioning
confidence: 99%