Quantum Public Key Cryptography DOI
Devang Pandya, P.S. Solanki,

Rakeshkumar Vanzara

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 181 - 214

Published: Sept. 27, 2024

Cryptography is not for secure the sensitive data but now days it compulsory in many applications like IoT, Cloud Platform, business systems and so on. A new area of advanced information technology called quantum-computing uses unique characteristics quantum physics to solve complex problems, which are beyond powers even most robust classical/powerful computers. Security major concern computing environment. Quantum cryptography, addition, merely practices ideologies mechanism encrypt/decrypt transmit a way that cannot be hacked by anyone. This chapter explores public key seeks create cryptographic building blocks can withstand attacks from computing-enabled adversary. Chapter begins with fundamental principles mechanics, cryptography and, core families quantum-resistant schemes.

Language: Английский

Key Fundamentals and Examples of Sensors for Human Health: Wearable, Non-Continuous, and Non-Contact Monitoring Devices DOI Creative Commons

Sara Guarducci,

Sara Jayousi,

Stefano Caputo

et al.

Sensors, Journal Year: 2025, Volume and Issue: 25(2), P. 556 - 556

Published: Jan. 19, 2025

The increasing demand for personalized healthcare, particularly among individuals requiring continuous health monitoring, has driven significant advancements in sensor technology. Wearable, non-continuous and non-contact sensors are leading this innovation, providing novel methods monitoring vital signs physiological data both clinical home settings. However, there is a lack of comprehensive comparative studies assessing the overall functionality these technologies. This paper aims to address gap by presenting detailed analysis selected wearable, used monitoring. To achieve this, we conducted evaluation various available on market, utilizing key indicators such as performance, usability, associated platforms functionality, management, battery efficiency, cost-effectiveness. Our findings highlight strengths limitations each type, thus offering valuable insights selection most appropriate technology based specific healthcare needs. study potential serve resource researchers, providers, policymakers, contributing deeper understanding existing user-centered solutions.

Language: Английский

Citations

1

The Future of Virology Diagnostics Using Wearable Devices Driven by Artificial Intelligence DOI
Malik Sallam, Maad M. Mijwil, Mostafa Abotaleb

et al.

Advances in computational intelligence and robotics book series, Journal Year: 2025, Volume and Issue: unknown, P. 473 - 504

Published: Jan. 10, 2025

The utilization of the wearable devices (WDs) that are enhanced by artificial intelligence (AI) can have a notable potential in healthcare. This chapter aimed to provide an overview applications AI-driven WDs enhancing early detection and management virus infections. First, we presented examples highlight capabilities very monitoring infections such as COVID-19. In addition, provided on utility machine learning algorithms analyze large data for signs We also overviewed enable real-time surveillance effective outbreak management. showed how this be achieved via collection analysis diverse WDs' across various populations. Finally, discussed challenges ethical issues comes with virology diagnostics, including concerns about privacy security well issue equitable access.

Language: Английский

Citations

0

‘The Way to Be Safe Is Never to Be Secure' DOI Creative Commons
Kabelo Given Chuma, Mpho Ngoepe

International Journal of Information Security and Privacy, Journal Year: 2025, Volume and Issue: 19(1), P. 1 - 21

Published: Jan. 10, 2025

Data security is used to protect sensitive and confidential patient health information. The healthcare sector affected by the myriad of cybersecurity threats attacks. Safeguarding Electronic Personal Health Information (ePHI) against attacks important. This study sought explore ePHI in South African hospitals with a view proposing framework. A qualitative was carried out public using semi-structured interviews purposively selected participants IT managers, technicians, network controllers. findings revealed that suffer from range threats, including Trojan viruses, cryptographic attacks, distributed denial service phishing emails, password malware lack policies poor compliance data protection laws have been recognised as major challenges facing hospitals. proposes framework could assist securing providing set guidelines safeguards.

Language: Английский

Citations

0

Quantum-Inspired Statistical Frameworks: Enhancing Traditional Methods with Quantum Principles DOI Creative Commons
Theodoros Kyriazos,

Mary Poga

Encyclopedia, Journal Year: 2025, Volume and Issue: 5(2), P. 48 - 48

Published: April 4, 2025

This manuscript introduces a comprehensive framework for augmenting classical statistical methodologies through the targeted integration of core quantum mechanical principles—specifically superposition, entanglement, measurement, wavefunctions, and density matrices. By concentrating on these foundational concepts instead whole expanse theory, we propose “quantum-inspired” models that address persistent shortcomings in conventional approaches. In particular, five pivotal distributions (normal, binomial, Poisson, Student’s t, chi-square) are reformulated to incorporate interference terms, phase factors, operator-based transformations, thereby facilitating representation multimodal data, phase-sensitive dependencies, correlated event patterns—characteristics frequently underrepresented purely real-valued, frameworks. Furthermore, ten quantum-inspired principles delineated guide practitioners systematically adapting mechanics traditional inferential tasks. These illustrated domain-specific applications finance, cryptography (distinct from direct applications), healthcare, climate modeling, demonstrating how amplitude-based confidence measures, matrices, measurement analogies can enrich standard by capturing more nuanced correlation structures enhancing predictive performance. unifying constructs with established this work underscores potential interdisciplinary collaboration paves way advanced data analysis tools capable addressing high-dimensional, complex, dynamically evolving datasets. Complete R code ensures reproducibility further exploration.

Language: Английский

Citations

0

Quantum Public Key Cryptography DOI
Devang Pandya, P.S. Solanki,

Rakeshkumar Vanzara

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 181 - 214

Published: Sept. 27, 2024

Cryptography is not for secure the sensitive data but now days it compulsory in many applications like IoT, Cloud Platform, business systems and so on. A new area of advanced information technology called quantum-computing uses unique characteristics quantum physics to solve complex problems, which are beyond powers even most robust classical/powerful computers. Security major concern computing environment. Quantum cryptography, addition, merely practices ideologies mechanism encrypt/decrypt transmit a way that cannot be hacked by anyone. This chapter explores public key seeks create cryptographic building blocks can withstand attacks from computing-enabled adversary. Chapter begins with fundamental principles mechanics, cryptography and, core families quantum-resistant schemes.

Language: Английский

Citations

0