Correction: Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage. [PDF]
PLOS ONE Staff.
europepmc +1 more source
Lightweight Security Framework for Data Outsourcing and Storage in Mobile Cloud Computing
Manzamasso KPELOU, Keshav Kishore
openalex +1 more source
Secure Cloud Storage with a Traceable Authorization System Using KGC
Mrs. R Sivaranjani
openalex +1 more source
An intelligent early warning and treatment system for monkeypox, utilizing a sprayable AIEgen‐ liquid dressing (AIE@LD) that responds to lesion pH. Integrated with a smartphone app and cloud platform, it enables real‐time infection detection via fluorescence imaging and triggers on‐demand photodynamic therapy under white light, effectively eradicating ...
Wei Wang +14 more
wiley +1 more source
Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage. [PDF]
Wang S, Guo K, Zhang Y.
europepmc +1 more source
The Oil and Gas Pipeline Clouding SCADA System and Multiple Data Centers Storage System Design
Miao Liu +3 more
openalex +1 more source
This review introduces the concept of “general curvy surface reconstruction,” which incorporates both geometric and physical dimensions, representing an upgrade over conventional geometric reconstruction that focuses solely on spatial relationships. Particular emphasis is placed on the emerging opportunities enabled by advanced measurement techniques ...
Chen Shang +8 more
wiley +1 more source
An Optimised Key cryptography for Securing Cloud Data Sharing and Storage Environment
Viharika Sudanagunta +29 more
openalex +1 more source
Universal Solvent Escape Strategies for Efficient Curing of Hydrogen‐Bond‐Rich 3D Printing Inks
This study developed a new 3D printing method for hydrogen‐bonded polymers by combining solvent replacement, nanoparticles, and optimized printing paths. This allows fast, precise scaffold fabrication. The scaffolds can be easily customized and release therapeutic agents slowly through protonation, enabling personalized bone, blood vessel, and nerve ...
Jie Chen +11 more
wiley +1 more source
Improving Data Storage Security in Cloud Computing Using Elliptic Curve Cryptography
Iosr Journals +2 more
openalex +1 more source

