Results 41 to 50 of about 253,734 (274)

Exploiting Hidden Information Leakages in Backward Privacy for Dynamic Searchable Symmetric Encryption

open access: yesApplied Sciences
Dynamic searchable symmetric encryption (DSSE) enables searches over encrypted data as well as data dynamics such as flexible data addition and deletion operations.
Hyundo Yoon   +4 more
doaj   +1 more source

HORNET: High-speed Onion Routing at the Network Layer [PDF]

open access: yes, 2015
We present HORNET, a system that enables high-speed end-to-end anonymous channels by leveraging next generation network architectures. HORNET is designed as a low-latency onion routing system that operates at the network layer thus enabling a wide range ...
Asoni, Daniele Enrico   +4 more
core   +2 more sources

Design of efficient anonymous identity authentication protocol for lightweight IoT devices

open access: yesTongxin xuebao, 2022
Aiming at the problem that complex security primitives in existing schemes were not suitable for resource-constrained IoT devices, a lightweight efficient anonymous identity authentication protocol for IoT devices was designed based on physical ...
Zhenyu WANG   +4 more
doaj   +2 more sources

Shining Light On Shadow Stacks

open access: yes, 2019
Control-Flow Hijacking attacks are the dominant attack vector against C/C++ programs. Control-Flow Integrity (CFI) solutions mitigate these attacks on the forward edge,i.e., indirect calls through function pointers and virtual calls.
Burow, Nathan   +2 more
core   +1 more source

Forward and Backward Private Searchable Encryption for Cloud-Assisted Industrial IoT

open access: yesSensors
In the cloud-assisted industrial Internet of Things (IIoT), since the cloud server is not always trusted, the leakage of data privacy becomes a critical problem. Dynamic symmetric searchable encryption (DSSE) allows for the secure retrieval of outsourced
Tianqi Peng   +7 more
doaj   +1 more source

Revisiting Mission‐Oriented Cancer Research to tackle the increasing burden of cancer in Europe–a policy perspective

open access: yesMolecular Oncology, EarlyView.
Translational cancer research and its implementation through competitively selected Comprehensive Cancer Centers across Europe should be the primary policy focus for addressing the increasing cancer burden in Europe and counteract the present main strategy to convert cancer to a chronic disease.
Manuel Heitor   +2 more
wiley   +1 more source

Multi-Authority Revocable Access Control Method Based on CP-ABE in NDN

open access: yesFuture Internet, 2020
For the future of the Internet, because information-centric network (ICN) have natural advantages in terms of content distribution, mobility, and security, it is regarded as a potential solution, or even the key, to solve many current problems.
Zhijun Wu, Yun Zhang, Enzhong Xu
doaj   +1 more source

A Complete Key Management Scheme for LoRaWAN v1.1

open access: yesSensors, 2021
Security is one of the major concerns of the Internet of Things (IoT) wireless technologies. LoRaWAN is one of the emerging Low Power Wide Area Networks being developed for IoT applications.
Xingda Chen, Margaret Lech, Liuping Wang
doaj   +1 more source

Multipath optimized link state routing for mobile ad hoc networks [PDF]

open access: yes, 2011
International audienceMultipath routing protocols for Mobile Ad hoc NETwork (MANET) address the problem of scalability, security (confidentiality and integrity), lifetime of networks, instability of wireless transmissions, and their adaptation to ...
Abolhasan   +11 more
core   +6 more sources

Mycobacterial cell division arrest and smooth‐to‐rough envelope transition using CRISPRi‐mediated genetic repression systems

open access: yesFEBS Open Bio, EarlyView.
CRISPRI‐mediated gene silencing and phenotypic exploration in nontuberculous mycobacteria. In this Research Protocol, we describe approaches to control, monitor, and quantitatively assess CRISPRI‐mediated gene silencing in M. smegmatis and M. abscessus model organisms.
Vanessa Point   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy