Results 41 to 50 of about 106,465 (133)

Cognitive Status in People With Epilepsy in the Republic of Guinea: A Prospective, Case–Control Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective People with epilepsy (PWE) may experience cognitive deficits but fail to undergo formal evaluation. This study compares cognitive status between PWE and healthy controls in the West African Republic of Guinea. Methods A cross‐sectional, case–control study was conducted in sequential recruitment phases (July 2024–July 2025) at Ignace ...
Maya L. Mastick   +14 more
wiley   +1 more source

Indistinguishable Encoding for Bidirectional Quantum Key Distribution: Theory to Experiment

open access: yes, 2017
We present for the first time, a bidirectional Quantum Key Distribution protocol with minimal encoding operations derived from the use of two `nonorthogonal' unitary transformations selected from two mutually unbiased unitary bases; which are ...
Shaari, J. S., Suryadi
core   +1 more source

A provably lightweight and secure DSSE scheme, with a constant storage cost for a smart device client.

open access: yesPLoS ONE
Outsourcing data to remote cloud providers is becoming increasingly popular amongst organizations and individuals. A semi-trusted server uses Searchable Symmetric Encryption (SSE) to keep the search information under acceptable leakage levels whilst ...
Salim Sabah Bulbul   +6 more
doaj   +1 more source

Anonymous authentication and location privacy preserving schemes for LTE-A networks

open access: yesEgyptian Informatics Journal, 2017
Long Term Evaluation Advanced (LTE-A) is the third generation partnership project for cellular network that allows subscribers to roam into networks (i.e., the Internet and wireless connections) using spacial purpose base-stations, such as wireless ...
Zaher Jabr Haddad   +2 more
doaj   +1 more source

Security of 5G-V2X: Technologies, Standardization and Research Directions

open access: yes, 2019
Cellular-Vehicle to Everything (C-V2X) aims at resolving issues pertaining to the traditional usability of Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) networking.
Guizani, Nadra   +2 more
core   +1 more source

Towards Efficient, Secure, and Fine-Grained Access Control System in MSNs with Flexible Revocations

open access: yesInternational Journal of Distributed Sensor Networks, 2015
With the pervasiveness of mobile communications, MSNs have become a promising networking paradigm for users to share contents with others through mobile devices. This convenience comes at the cost of some serious security and privacy issues. In this work,
Shi-Feng Sun   +4 more
doaj   +1 more source

Based on model randomization and adaptive defense for federated learning schemes

open access: yesScientific Reports
Federated Learning (FL) is a privacy-enhancing technique that enables multiple participants to collaboratively train machine learning models without sharing their local data.
Gaofeng Yue, Xiaowei Han
doaj   +1 more source

M-SSE: An Effective Searchable Symmetric Encryption With Enhanced Security for Mobile Devices

open access: yesIEEE Access, 2018
Searchable encryption allows mobile devices with limited computing and storage resources to outsource data to an untrusted cloud server. Users are able to search and retrieve the outsourced data; however, it suffers from information and privacy leakage ...
Chongzhi Gao   +5 more
doaj   +1 more source

ACE: A Consent-Embedded privacy-preserving search on genomic database

open access: yesHeliyon
In this paper, we introduce ACE, a consent-embedded searchable encryption scheme. ACE enables dynamic consent management by supporting the physical deletion of associated data at the time of consent revocation. This ensures instant real deletion of data,
Sara Jafarbeiki   +5 more
doaj   +1 more source

Distributed accelerated descent algorithm for energy resource coordination in multi‐agent integrated energy systems

open access: yesIET Generation, Transmission & Distribution, 2021
Composed of multiple integrated energy systems (IESs) belonging to different stakeholders, multi‐agent IESs (MA‐IESs) are widely concerned because of data privacy protect.
Yu Kou   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy