Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (892)

Search Parameters:
Keywords = digital privacy

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
7 pages, 208 KiB  
Proceeding Paper
Post-Quantum Crystal-Kyber Group-Oriented Encryption Scheme for Cloud Security in Personal Health Records
by Zhen-Yu Wu and Chia-Hui Liu
Eng. Proc. 2025, 103(1), 6; https://doi.org/10.3390/engproc2025103006 - 6 Aug 2025
Abstract
As medical technology develops and digital demands grow, personal health records (PHRs) are becoming more patient-centered than before based on cloud-based health information exchanges. While enhancing data accessibility and sharing, these systems present privacy and security issues, including data breaches and unauthorized access. [...] Read more.
As medical technology develops and digital demands grow, personal health records (PHRs) are becoming more patient-centered than before based on cloud-based health information exchanges. While enhancing data accessibility and sharing, these systems present privacy and security issues, including data breaches and unauthorized access. We developed a post-quantum, group-oriented encryption scheme using the Crystal-Kyber Key encapsulation mechanism (KEM). Leveraging lattice-based post-quantum cryptography, this scheme ensures quantum resilience and chosen ciphertext attack security for layered cloud PHR environments. It supports four encryption modes: individual, group, subgroup-specific, and authorized subgroup decryption, meeting diverse data access needs. With efficient key management requiring only one private key per user, the developed scheme strengthens the privacy and security of PHRs in a future-proof, flexible, and scalable manner. Full article
19 pages, 455 KiB  
Article
A Quantum-Resistant FHE Framework for Privacy-Preserving Image Processing in the Cloud
by Rafik Hamza
Algorithms 2025, 18(8), 480; https://doi.org/10.3390/a18080480 - 4 Aug 2025
Viewed by 26
Abstract
The advent of quantum computing poses an existential threat to the security of cloud services that handle sensitive visual data. Simultaneously, the need for computational privacy requires the ability to process data without exposing it to the cloud provider. This paper introduces and [...] Read more.
The advent of quantum computing poses an existential threat to the security of cloud services that handle sensitive visual data. Simultaneously, the need for computational privacy requires the ability to process data without exposing it to the cloud provider. This paper introduces and evaluates a hybrid quantum-resistant framework that addresses both challenges by integrating NIST-standardized post-quantum cryptography with optimized fully homomorphic encryption (FHE). Our solution uses CRYSTALS-Kyber for secure channel establishment and the CKKS FHE scheme with SIMD batching to perform image processing tasks on a cloud server without ever decrypting the image. This work provides a comprehensive performance analysis of the complete, end-to-end system. Our empirical evaluation demonstrates the framework’s practicality, detailing the sub-millisecond PQC setup costs and the amortized transfer of 33.83 MB of public FHE materials. The operational performance shows remarkable scalability, with server-side computations and client-side decryption completing within low single-digit milliseconds. By providing a detailed analysis of a viable and efficient architecture, this framework establishes a practical foundation for the next generation of privacy-preserving cloud applications. Full article
Show Figures

Figure 1

36 pages, 1010 KiB  
Article
SIBERIA: A Self-Sovereign Identity and Multi-Factor Authentication Framework for Industrial Access
by Daniel Paredes-García, José Álvaro Fernández-Carrasco, Jon Ander Medina López, Juan Camilo Vasquez-Correa, Imanol Jericó Yoldi, Santiago Andrés Moreno-Acevedo, Ander González-Docasal, Haritz Arzelus Irazusta, Aitor Álvarez Muniain and Yeray de Diego Loinaz
Appl. Sci. 2025, 15(15), 8589; https://doi.org/10.3390/app15158589 (registering DOI) - 2 Aug 2025
Viewed by 213
Abstract
The growing need for secure and privacy-preserving identity management in industrial environments has exposed the limitations of traditional, centralized authentication systems. In this context, SIBERIA was developed as a modular solution that empowers users to control their own digital identities, while ensuring robust [...] Read more.
The growing need for secure and privacy-preserving identity management in industrial environments has exposed the limitations of traditional, centralized authentication systems. In this context, SIBERIA was developed as a modular solution that empowers users to control their own digital identities, while ensuring robust protection of critical services. The system is designed in alignment with European standards and regulations, including EBSI, eIDAS 2.0, and the GDPR. SIBERIA integrates a Self-Sovereign Identity (SSI) framework with a decentralized blockchain-based infrastructure for the issuance and verification of Verifiable Credentials (VCs). It incorporates multi-factor authentication by combining a voice biometric module, enhanced with spoofing-aware techniques to detect synthetic or replayed audio, and a behavioral biometrics module that provides continuous authentication by monitoring user interaction patterns. The system enables secure and user-centric identity management in industrial contexts, ensuring high resistance to impersonation and credential theft while maintaining regulatory compliance. SIBERIA demonstrates that it is possible to achieve both strong security and user autonomy in digital identity systems by leveraging decentralized technologies and advanced biometric verification methods. Full article
(This article belongs to the Special Issue Blockchain and Distributed Systems)
Show Figures

Figure 1

24 pages, 1380 KiB  
Article
Critical Smart Functions for Smart Living Based on User Perspectives
by Benjamin Botchway, Frank Ato Ghansah, David John Edwards, Ebenezer Kumi-Amoah and Joshua Amo-Larbi
Buildings 2025, 15(15), 2727; https://doi.org/10.3390/buildings15152727 - 1 Aug 2025
Viewed by 268
Abstract
Smart living is strongly promoted to enhance the quality of life via the application of innovative solutions, and this is driven by domain specialists and policymakers, including designers, urban planners, computer engineers, and property developers. Nonetheless, the actual user, whose views ought to [...] Read more.
Smart living is strongly promoted to enhance the quality of life via the application of innovative solutions, and this is driven by domain specialists and policymakers, including designers, urban planners, computer engineers, and property developers. Nonetheless, the actual user, whose views ought to be considered during the design and development of smart living systems, has received little attention. Thus, this study aims to identify and examine the critical smart functions to achieve smart living in smart buildings based on occupants’ perceptions. The aim is achieved using a sequential quantitative research method involving a literature review and 221 valid survey data gathered from a case of a smart student residence in Hong Kong. The method is further integrated with descriptive statistics, the Kruskal–Walli’s test, and the criticality test. The results were validated via a post-survey with related experts. Twenty-six critical smart functions for smart living were revealed, with the top three including the ability to protect personal data and information privacy, provide real-time safety and security, and the ability to be responsive to users’ needs. A need was discovered to consider the context of buildings during the design of smart living systems, and the recommendation is for professionals to understand the kind of digital technology to be integrated into a building by strongly considering the context of the building and how smart living will be achieved within it based on users’ perceptions. The study provides valuable insights into the occupants’ perceptions of critical smart features/functions for policymakers and practitioners to consider in the construction of smart living systems, specifically students’ smart buildings. This study contributes to knowledge by identifying the critical smart functions to achieve smart living based on occupants’ perceptions of smart living by considering the specific context of a smart student building facility constructed in Hong Kong. Full article
Show Figures

Figure 1

24 pages, 1294 KiB  
Article
Confidential Smart Contracts and Blockchain to Implement a Watermarking Protocol
by Franco Frattolillo
Future Internet 2025, 17(8), 352; https://doi.org/10.3390/fi17080352 - 1 Aug 2025
Viewed by 137
Abstract
Watermarking protocols represent a possible solution to the problem of digital copyright protection of content distributed on the Internet. Their implementations, however, continue to be a complex problem due to the difficulties researchers encounter in proposing secure, easy-to-use and, at the same time, [...] Read more.
Watermarking protocols represent a possible solution to the problem of digital copyright protection of content distributed on the Internet. Their implementations, however, continue to be a complex problem due to the difficulties researchers encounter in proposing secure, easy-to-use and, at the same time, “trusted third parties” (TTPs)-free solutions. In this regard, implementations based on blockchain and smart contracts are among the most advanced and promising, even if they are affected by problems regarding the performance and privacy of the information exchanged and processed by smart contracts and managed by blockchains. This paper presents a watermarking protocol implemented by smart contracts and blockchain. The protocol uses a “layer-2” blockchain execution model and performs the computation in “trusted execution environments” (TEEs). Therefore, its implementation can guarantee efficient and confidential execution without compromising ease of use or resorting to TTPs. The protocol and its implementation can, thus, be considered a valid answer to the “trilemma” that afflicts the use of blockchains, managing to guarantee decentralization, security, and scalability. Full article
Show Figures

Figure 1

15 pages, 317 KiB  
Review
The Contribution of Artificial Intelligence in Nursing Education: A Scoping Review of the Literature
by Federico Cucci, Dario Marasciulo, Mattia Romani, Giovanni Soldano, Donato Cascio, Giorgio De Nunzio, Cosimo Caldararo, Ivan Rubbi, Elsa Vitale, Roberto Lupo and Luana Conte
Nurs. Rep. 2025, 15(8), 283; https://doi.org/10.3390/nursrep15080283 - 1 Aug 2025
Viewed by 181
Abstract
Background and Aim: Artificial intelligence (AI) is among the most promising innovations for transforming nursing education, making it more interactive, personalized, and competency-based. However, its integration also raises significant ethical and practical concerns. This scoping review aims to analyze and summarize key studies [...] Read more.
Background and Aim: Artificial intelligence (AI) is among the most promising innovations for transforming nursing education, making it more interactive, personalized, and competency-based. However, its integration also raises significant ethical and practical concerns. This scoping review aims to analyze and summarize key studies on the application of AI in university-level nursing education, focusing on its benefits, challenges, and future prospects. Methods: A scoping review was conducted using the Population, Concept, and Context (PCC) framework, targeting nursing students and educators in academic settings. A comprehensive search was carried out across the PubMed, Scopus, and Web of Science databases. Only peer-reviewed original studies published in English were included. Two researchers independently screened the studies, resolving any disagreements through team discussion. Data were synthesized narratively. Results: Of the 569 articles initially identified, 11 original studies met the inclusion criteria. The findings indicate that AI-based tools—such as virtual simulators and ChatGPT—can enhance students’ learning experiences, communication skills, and clinical preparedness. Nonetheless, several challenges were identified, including increased simulation-related anxiety, potential misuse, and ethical concerns related to data quality, privacy, and academic integrity. Conclusions: AI offers significant opportunities to enhance nursing education; however, its implementation must be approached with critical awareness and responsibility. It is essential that students develop both digital competencies and ethical sensitivity to fully leverage AI’s potential while ensuring high-quality education and responsible nursing practice. Full article
Show Figures

Figure 1

24 pages, 624 KiB  
Systematic Review
Integrating Artificial Intelligence into Perinatal Care Pathways: A Scoping Review of Reviews of Applications, Outcomes, and Equity
by Rabie Adel El Arab, Omayma Abdulaziz Al Moosa, Zahraa Albahrani, Israa Alkhalil, Joel Somerville and Fuad Abuadas
Nurs. Rep. 2025, 15(8), 281; https://doi.org/10.3390/nursrep15080281 - 31 Jul 2025
Viewed by 143
Abstract
Background: Artificial intelligence (AI) and machine learning (ML) have been reshaping maternal, fetal, neonatal, and reproductive healthcare by enhancing risk prediction, diagnostic accuracy, and operational efficiency across the perinatal continuum. However, no comprehensive synthesis has yet been published. Objective: To conduct a scoping [...] Read more.
Background: Artificial intelligence (AI) and machine learning (ML) have been reshaping maternal, fetal, neonatal, and reproductive healthcare by enhancing risk prediction, diagnostic accuracy, and operational efficiency across the perinatal continuum. However, no comprehensive synthesis has yet been published. Objective: To conduct a scoping review of reviews of AI/ML applications spanning reproductive, prenatal, postpartum, neonatal, and early child-development care. Methods: We searched PubMed, Embase, the Cochrane Library, Web of Science, and Scopus through April 2025. Two reviewers independently screened records, extracted data, and assessed methodological quality using AMSTAR 2 for systematic reviews, ROBIS for bias assessment, SANRA for narrative reviews, and JBI guidance for scoping reviews. Results: Thirty-nine reviews met our inclusion criteria. In preconception and fertility treatment, convolutional neural network-based platforms can identify viable embryos and key sperm parameters with over 90 percent accuracy, and machine-learning models can personalize follicle-stimulating hormone regimens to boost mature oocyte yield while reducing overall medication use. Digital sexual-health chatbots have enhanced patient education, pre-exposure prophylaxis adherence, and safer sexual behaviors, although data-privacy safeguards and bias mitigation remain priorities. During pregnancy, advanced deep-learning models can segment fetal anatomy on ultrasound images with more than 90 percent overlap compared to expert annotations and can detect anomalies with sensitivity exceeding 93 percent. Predictive biometric tools can estimate gestational age within one week with accuracy and fetal weight within approximately 190 g. In the postpartum period, AI-driven decision-support systems and conversational agents can facilitate early screening for depression and can guide follow-up care. Wearable sensors enable remote monitoring of maternal blood pressure and heart rate to support timely clinical intervention. Within neonatal care, the Heart Rate Observation (HeRO) system has reduced mortality among very low-birth-weight infants by roughly 20 percent, and additional AI models can predict neonatal sepsis, retinopathy of prematurity, and necrotizing enterocolitis with area-under-the-curve values above 0.80. From an operational standpoint, automated ultrasound workflows deliver biometric measurements at about 14 milliseconds per frame, and dynamic scheduling in IVF laboratories lowers staff workload and per-cycle costs. Home-monitoring platforms for pregnant women are associated with 7–11 percent reductions in maternal mortality and preeclampsia incidence. Despite these advances, most evidence derives from retrospective, single-center studies with limited external validation. Low-resource settings, especially in Sub-Saharan Africa, remain under-represented, and few AI solutions are fully embedded in electronic health records. Conclusions: AI holds transformative promise for perinatal care but will require prospective multicenter validation, equity-centered design, robust governance, transparent fairness audits, and seamless electronic health record integration to translate these innovations into routine practice and improve maternal and neonatal outcomes. Full article
Show Figures

Figure 1

16 pages, 2174 KiB  
Article
TwinFedPot: Honeypot Intelligence Distillation into Digital Twin for Persistent Smart Traffic Security
by Yesin Sahraoui, Abdessalam Mohammed Hadjkouider, Chaker Abdelaziz Kerrache and Carlos T. Calafate
Sensors 2025, 25(15), 4725; https://doi.org/10.3390/s25154725 - 31 Jul 2025
Viewed by 255
Abstract
The integration of digital twins (DTs) with intelligent traffic systems (ITSs) holds strong potential for improving real-time management in smart cities. However, securing digital twins remains a significant challenge due to the dynamic and adversarial nature of cyber–physical environments. In this work, we [...] Read more.
The integration of digital twins (DTs) with intelligent traffic systems (ITSs) holds strong potential for improving real-time management in smart cities. However, securing digital twins remains a significant challenge due to the dynamic and adversarial nature of cyber–physical environments. In this work, we propose TwinFedPot, an innovative digital twin-based security architecture that combines honeypot-driven data collection with Zero-Shot Learning (ZSL) for robust and adaptive cyber threat detection without requiring prior sampling. The framework leverages Inverse Federated Distillation (IFD) to train the DT server, where edge-deployed honeypots generate semantic predictions of anomalous behavior and upload soft logits instead of raw data. Unlike conventional federated approaches, TwinFedPot reverses the typical knowledge flow by distilling collective intelligence from the honeypots into a central teacher model hosted on the DT. This inversion allows the system to learn generalized attack patterns using only limited data, while preserving privacy and enhancing robustness. Experimental results demonstrate significant improvements in accuracy and F1-score, establishing TwinFedPot as a scalable and effective defense solution for smart traffic infrastructures. Full article
Show Figures

Figure 1

34 pages, 2740 KiB  
Article
Lightweight Anomaly Detection in Digit Recognition Using Federated Learning
by Anja Tanović and Ivan Mezei
Future Internet 2025, 17(8), 343; https://doi.org/10.3390/fi17080343 - 30 Jul 2025
Viewed by 240
Abstract
This study presents a lightweight autoencoder-based approach for anomaly detection in digit recognition using federated learning on resource-constrained embedded devices. We implement and evaluate compact autoencoder models on the ESP32-CAM microcontroller, enabling both training and inference directly on the device using 32-bit floating-point [...] Read more.
This study presents a lightweight autoencoder-based approach for anomaly detection in digit recognition using federated learning on resource-constrained embedded devices. We implement and evaluate compact autoencoder models on the ESP32-CAM microcontroller, enabling both training and inference directly on the device using 32-bit floating-point arithmetic. The system is trained on a reduced MNIST dataset (1000 resized samples) and evaluated using EMNIST and MNIST-C for anomaly detection. Seven fully connected autoencoder architectures are first evaluated on a PC to explore the impact of model size and batch size on training time and anomaly detection performance. Selected models are then re-implemented in the C programming language and deployed on a single ESP32 device, achieving training times as short as 12 min, inference latency as low as 9 ms, and F1 scores of up to 0.87. Autoencoders are further tested on ten devices in a real-world federated learning experiment using Wi-Fi. We explore non-IID and IID data distribution scenarios: (1) digit-specialized devices and (2) partitioned datasets with varying content and anomaly types. The results show that small unmodified autoencoder models can be effectively trained and evaluated directly on low-power hardware. The best models achieve F1 scores of up to 0.87 in the standard IID setting and 0.86 in the extreme non-IID setting. Despite some clients being trained on corrupted datasets, federated aggregation proves resilient, maintaining high overall performance. The resource analysis shows that more than half of the models and all the training-related allocations fit entirely in internal RAM. These findings confirm the feasibility of local float32 training and collaborative anomaly detection on low-cost hardware, supporting scalable and privacy-preserving edge intelligence. Full article
(This article belongs to the Special Issue Intelligent IoT and Wireless Communication)
Show Figures

Figure 1

24 pages, 1806 KiB  
Article
Optimization of Cleaning and Hygiene Processes in Healthcare Using Digital Technologies and Ensuring Quality Assurance with Blockchain
by Semra Tebrizcik, Süleyman Ersöz, Elvan Duman, Adnan Aktepe and Ahmet Kürşad Türker
Appl. Sci. 2025, 15(15), 8460; https://doi.org/10.3390/app15158460 - 30 Jul 2025
Viewed by 175
Abstract
Many hospitals still lack digital traceability in hygiene and cleaning management, leading to operational inefficiencies and inconsistent quality control. This study aims to establish cleaning and hygiene processes in healthcare services that are planned in accordance with standards, as well as to enhance [...] Read more.
Many hospitals still lack digital traceability in hygiene and cleaning management, leading to operational inefficiencies and inconsistent quality control. This study aims to establish cleaning and hygiene processes in healthcare services that are planned in accordance with standards, as well as to enhance the traceability and sustainability of these processes through digitalization. This study proposes a Hyperledger Fabric-based blockchain architecture to establish a reliable and transparent quality assurance system in process management. The proposed Quality Assurance Model utilizes digital technologies and IoT-based RFID devices to ensure the transparent and reliable monitoring of cleaning processes. Operational data related to cleaning processes are automatically recorded and secured using a decentralized blockchain infrastructure. The permissioned nature of Hyperledger Fabric provides a more secure solution compared to traditional data management systems in the healthcare sector while preserving data privacy. Additionally, the execute–order–validate mechanism supports effective data sharing among stakeholders, and consensus algorithms along with chaincode rules enhance the reliability of processes. A working prototype was implemented and validated using Hyperledger Caliper under resource-constrained cloud environments, confirming the system’s feasibility through over 100 TPS throughput and zero transaction failures. Through the proposed system, cleaning/hygiene processes in patient rooms are conducted securely, contributing to the improvement of quality standards in healthcare services. Full article
Show Figures

Figure 1

50 pages, 8673 KiB  
Article
Challenges of Integrating Assistive Technologies and Robots with Embodied Intelligence in the Homes of Older People Living with Frailty
by Abdel-Karim Al-Tamimi, Lantana Hewitt, David Cameron, Maher Salem and Armaghan Moemeni
Appl. Sci. 2025, 15(15), 8415; https://doi.org/10.3390/app15158415 - 29 Jul 2025
Viewed by 235
Abstract
The rapid increase in the global population of older adults presents a significant challenge, but also a unique opportunity to leverage technological advancements for promoting independent living and well-being. This study introduces the CIREI framework, which is a comprehensive model designed to enhance [...] Read more.
The rapid increase in the global population of older adults presents a significant challenge, but also a unique opportunity to leverage technological advancements for promoting independent living and well-being. This study introduces the CIREI framework, which is a comprehensive model designed to enhance the integration of smart home and assistive technologies specifically for pre-frail older adults. Developed through a systematic literature review and innovative and comprehensive co-design activities, the CIREI framework captures the nuanced needs, preferences, and challenges faced by older adults, caregivers, and experts. Key findings from the co-design workshop highlight critical factors such as usability, privacy, and personalised learning preferences, which directly influence technology adoption. These insights informed the creation of an intelligent middleware prototype named WISE-WARE, which seamlessly integrates commercial off-the-shelf (COTS) devices to support health management and improve the quality of life for older adults. The CIREI framework’s adaptability ensures it can be extended and refined to meet the ever-changing needs of the ageing population, providing a robust foundation for future research and development in user-centred technology design. All workshop materials, including tools and methodologies, are made available to encourage the further exploration and adaptation of the CIREI framework, ensuring its relevance and effectiveness in the dynamic landscape of ageing and technology. This research contributes significantly to the discourse on ageing in place, digital inclusion, and the role of technology in empowering older adults to maintain independence. Full article
Show Figures

Figure 1

31 pages, 1317 KiB  
Article
Privacy-Preserving Clinical Decision Support for Emergency Triage Using LLMs: System Architecture and Real-World Evaluation
by Alper Karamanlıoğlu, Berkan Demirel, Onur Tural, Osman Tufan Doğan and Ferda Nur Alpaslan
Appl. Sci. 2025, 15(15), 8412; https://doi.org/10.3390/app15158412 - 29 Jul 2025
Viewed by 346
Abstract
This study presents a next-generation clinical decision-support architecture for Clinical Decision Support Systems (CDSS) focused on emergency triage. By integrating Large Language Models (LLMs), Federated Learning (FL), and low-latency streaming analytics within a modular, privacy-preserving framework, the system addresses key deployment challenges in [...] Read more.
This study presents a next-generation clinical decision-support architecture for Clinical Decision Support Systems (CDSS) focused on emergency triage. By integrating Large Language Models (LLMs), Federated Learning (FL), and low-latency streaming analytics within a modular, privacy-preserving framework, the system addresses key deployment challenges in high-stakes clinical settings. Unlike traditional models, the architecture processes both structured (vitals, labs) and unstructured (clinical notes) data to enable context-aware reasoning with clinically acceptable latency at the point of care. It leverages big data infrastructure for large-scale EHR management and incorporates digital twin concepts for live patient monitoring. Federated training allows institutions to collaboratively improve models without sharing raw data, ensuring compliance with GDPR/HIPAA, and FAIR principles. Privacy is further protected through differential privacy, secure aggregation, and inference isolation. We evaluate the system through two studies: (1) a benchmark of 750+ USMLE-style questions validating the medical reasoning of fine-tuned LLMs; and (2) a real-world case study (n = 132, 75.8% first-pass agreement) using de-identified MIMIC-III data to assess triage accuracy and responsiveness. The system demonstrated clinically acceptable latency and promising alignment with expert judgment on reviewed cases. The infectious disease triage case demonstrates low-latency recognition of sepsis-like presentations in the ED. This work offers a scalable, audit-compliant, and clinician-validated blueprint for CDSS, enabling low-latency triage and extensibility across specialties. Full article
(This article belongs to the Special Issue Large Language Models: Transforming E-health)
Show Figures

Figure 1

22 pages, 1156 KiB  
Article
An Attribute-Based Proxy Re-Encryption Scheme Supporting Revocable Access Control
by Gangzheng Zhao, Weijie Tan and Changgen Peng
Electronics 2025, 14(15), 2988; https://doi.org/10.3390/electronics14152988 - 26 Jul 2025
Viewed by 271
Abstract
In the deep integration process between digital infrastructure and new economic forms, structural imbalance between the evolution rate of cloud storage technology and the growth rate of data-sharing demands has caused systemic security vulnerabilities such as blurred data sovereignty boundaries and nonlinear surges [...] Read more.
In the deep integration process between digital infrastructure and new economic forms, structural imbalance between the evolution rate of cloud storage technology and the growth rate of data-sharing demands has caused systemic security vulnerabilities such as blurred data sovereignty boundaries and nonlinear surges in privacy leakage risks. Existing academic research indicates current proxy re-encryption schemes remain insufficient for cloud access control scenarios characterized by diversified user requirements and personalized permission management, thus failing to fulfill the security needs of emerging computing paradigms. To resolve these issues, a revocable attribute-based proxy re-encryption scheme supporting policy-hiding is proposed. Data owners encrypt data and upload it to the blockchain while concealing attribute values within attribute-based encryption access policies, effectively preventing sensitive information leaks and achieving fine-grained secure data sharing. Simultaneously, proxy re-encryption technology enables verifiable outsourcing of complex computations. Furthermore, the SM3 (SM3 Cryptographic Hash Algorithm) hash function is embedded in user private key generation, and key updates are executed using fresh random factors to revoke malicious users. Ultimately, the scheme proves indistinguishability under chosen-plaintext attacks for specific access structures in the standard model. Experimental simulations confirm that compared with existing schemes, this solution delivers higher execution efficiency in both encryption/decryption and revocation phases. Full article
(This article belongs to the Topic Recent Advances in Security, Privacy, and Trust)
Show Figures

Figure 1

26 pages, 12108 KiB  
Article
Image Encryption Algorithm Based on an Improved Tent Map and Dynamic DNA Coding
by Wei Zhou, Xianwei Li and Zhenghua Xin
Entropy 2025, 27(8), 796; https://doi.org/10.3390/e27080796 - 26 Jul 2025
Viewed by 223
Abstract
As multimedia technologies evolve, digital images have become increasingly prevalent across various fields, highlighting an urgent demand for robust image privacy and security mechanisms. However, existing image encryption algorithms (IEAs) still face limitations in balancing strong security, real-time performance, and computational efficiency. Therefore, [...] Read more.
As multimedia technologies evolve, digital images have become increasingly prevalent across various fields, highlighting an urgent demand for robust image privacy and security mechanisms. However, existing image encryption algorithms (IEAs) still face limitations in balancing strong security, real-time performance, and computational efficiency. Therefore, we proposes a new IEA that integrates an improved chaotic map (Tent map), an improved Zigzag transform, and dynamic DNA coding. Firstly, a pseudo-wavelet transform (PWT) is applied to plain images to produce four sub-images I1, I2, I3, and I4. Secondly, the improved Zigzag transform and its three variants are used to rearrange the sub-image I1, and then the scrambled sub-image is diffused using XOR operation. Thirdly, an inverse pseudo-wavelet transform (IPWT) is employed on the four sub-images to reconstruct the image, and then the reconstructed image is encoded into a DNA sequence utilizing dynamic DNA encoding. Finally, the DNA sequence is scrambled and diffused employing DNA-level index scrambling and dynamic DNA operations. The experimental results and performance evaluations, including chaotic performance evaluation and comprehensive security analysis, demonstrate that our IEA achieves high key sensitivity, low correlation, excellent entropy, and strong resistance to common attacks. This highlights its potential for deployment in real-time, high-security image cryptosystems, especially in fields such as medical image security and social media privacy. Full article
(This article belongs to the Section Multidisciplinary Applications)
Show Figures

Figure 1

22 pages, 3332 KiB  
Article
Student Perceptions of the Use of Gen-AI in a Higher Education Program in Spain
by José María Campillo-Ferrer, Alejandro López-García and Pedro Miralles-Sánchez
Digital 2025, 5(3), 29; https://doi.org/10.3390/digital5030029 - 25 Jul 2025
Viewed by 585
Abstract
This research analyzed university students’ perceptions of the use of generative artificial intelligence (hereafter Gen-AI) in a higher education context. Specifically, it addressed the potential benefits and challenges related to the application of these web-based resources. A mixed method was adopted and the [...] Read more.
This research analyzed university students’ perceptions of the use of generative artificial intelligence (hereafter Gen-AI) in a higher education context. Specifically, it addressed the potential benefits and challenges related to the application of these web-based resources. A mixed method was adopted and the sample consisted of 407 teacher training students enrolled in the Early Childhood and Primary Education Degrees in the Region of Murcia in Spain. The results indicated a clear recognition of the relevance of these technological tools for teaching and learning. Respondents highlighted the potential to engage them in academic tasks, increase their motivation, and personalize their learning pathways. However, participants identified some challenges related to technology dependency, ethical issues, and privacy concerns. By understanding learners’ beliefs and assumptions, educators and educational administrations can adapt Gen-AI according to learners’ needs and preferences to improve their academic performance. In learning practice, these adaptations could involve evidence-based interventions, such as AI literacy modules or hybrid assessment frameworks, to translate findings into practice. In addition, it is necessary to adjust materials, methodologies, and the assessment of the academic curriculum to facilitate student learning and ensure that all students have access to quality education and the adequate development of digital skills. Full article
Show Figures

Figure 1

Back to TopTop