Results 31 to 40 of about 106,465 (133)
Differentially private false discovery rate control
Differential privacy provides a rigorous framework for privacy-preserving data analysis. This paper proposes the first differentially private procedure for controlling the false discovery rate (FDR) in multiple hypothesis testing.
Cynthia Dwork, Weijie Su, Li Zhang
doaj
Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control
Untrusted servers are servers or storage entities lacking complete trust from the data owner or users. This characterization implies that the server hosting encrypted data may not enjoy full trust from data owners or users, stemming from apprehensions ...
Salim Sabah Bulbul +5 more
doaj +1 more source
Aggregative Game for Distributed Charging Strategy of PEVs in a Smart Charging Station
This paper proposes a charging strategy for plug-in electric vehicles (PEVs) in a smart charging station (SCS) that considers load constraints and time anxieties.
Ti Kang, Huaqing Li, Lifeng Zheng
doaj +1 more source
Mapping the evolution of mitochondrial complex I through structural variation
Respiratory complex I (CI) is crucial for bioenergetic metabolism in many prokaryotes and eukaryotes. It is composed of a conserved set of core subunits and additional accessory subunits that vary depending on the organism. Here, we categorize CI subunits from available structures to map the evolution of CI across eukaryotes. Respiratory complex I (CI)
Dong‐Woo Shin +2 more
wiley +1 more source
Development of therapies targeting cancer‐associated fibroblasts (CAFs) necessitates preclinical model systems that faithfully represent CAF–tumor biology. We established an in vitro coculture system of patient‐derived pancreatic CAFs and tumor cell lines and demonstrated its recapitulation of primary CAF–tumor biology with single‐cell transcriptomics ...
Elysia Saputra +10 more
wiley +1 more source
DSTC: DNS-based Strict TLS Configurations
Most TLS clients such as modern web browsers enforce coarse-grained TLS security configurations. They support legacy versions of the protocol that have known design weaknesses, and weak ciphersuites that provide fewer security guarantees (e.g.
AJ Menezes +3 more
core +1 more source
Translational cancer research and its implementation through competitively selected Comprehensive Cancer Centers across Europe should be the primary policy focus for addressing the increasing cancer burden in Europe and counteract the present main strategy to convert cancer to a chronic disease.
Manuel Heitor +2 more
wiley +1 more source
Provable secure ownership transfer protocol for RFID tag
With the ownership transfer of an object,the ownership of the RFID tag attached to it also needs to be transferred.Security and privacy are the key issues while researchers studying the process of RFID tag ownership transfer.In the UC(universally ...
Bian-qing YUAN, Ji-qiang LIU
doaj +2 more sources
Objective: To assess how staff attitudes before, during, and after implementation of a real-time location system (RTLS) that uses radio-frequency identification tags on staff and patient identification badges and on equipment affected staff’s intention ...
Joan M. Griffin, PhD +13 more
doaj +1 more source
On the Privacy of Two Tag Ownership Transfer Protocols for RFIDs [PDF]
In this paper, the privacy of two recent RFID tag ownership transfer protocols are investigated against the tag owners as adversaries. The first protocol called ROTIV is a scheme which provides a privacy-preserving ownership transfer by using an HMAC ...
Abyaneh, Mohammad Reza Sohizadeh
core +1 more source

