2023
DOI: 10.1007/s42979-023-01717-0
|View full text |Cite
|
Sign up to set email alerts
|

Correction: Bio-inspired Computing Techniques for Data Security Challenges and Controls

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
0
0
Order By: Relevance
“…However, when utilizing public key cryptography, two distinct keys are required: one for encryption and one for decryption. In this scenario, the encryption key is made publicly accessible, while the decryption key is kept confidential as sensitive information [9]. Consequently, ensuring the security of medical images is significant in the IoMT environment.…”
Section: Introductionmentioning
confidence: 99%
“…However, when utilizing public key cryptography, two distinct keys are required: one for encryption and one for decryption. In this scenario, the encryption key is made publicly accessible, while the decryption key is kept confidential as sensitive information [9]. Consequently, ensuring the security of medical images is significant in the IoMT environment.…”
Section: Introductionmentioning
confidence: 99%