Results 31 to 40 of about 3,111 (159)

Nutritional properties, traditional uses and potential new applications for the sotol plant (Asparagaceae, Convallarioideae): A review

open access: yesPLANTS, PEOPLE, PLANET, EarlyView.
Sotol (Dasylirion spp.) is a resilient desert plant that sustains ecosystems, cultures and livelihoods in Chihuahua Desert. Our review highlights its nutritional properties, traditional uses and potential new applications in food, pharmaceuticals, renewable energy and water remediation. By synthesizing evidence across disciplines, we show how sotol can
Dámaris Leopoldina Ojeda Barrios   +7 more
wiley   +1 more source

Efficient CP-ABE Attribute/Key Management for IoT Applications [PDF]

open access: yes2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, 2015
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is a promising cryptographic mechanism for fine-grained access control to shared data. Attribute/Key management is a keystone issue in CP-APE because of low efficiency of existing attribute revocation techniques.
Lyes Touati, Yacine Challal
openaire   +1 more source

Feeding Management of African Rhinos (Ceratotherium simum, Diceros bicornis) in European Zoos

open access: yesZoo Biology, EarlyView.
The average estimated diets (in % dry matter) of white rhinos (C. simum) and black rhinos (D. bicornis) in European zoos differ in the proportion of (pelleted) compound feed and other non‐forage items. The reason for this difference is elusive but possibly related to creating more complicated diets for browsers. ABSTRACT White rhinos (WR, Ceratotherium
Gila Sauspeter   +6 more
wiley   +1 more source

A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis   +7 more
wiley   +1 more source

Calibration and discrimination ability of the Dat'AIDS score in people living with HIV aged 70 years and older from the Dat'AIDS cohort

open access: yesHIV Medicine, EarlyView.
Abstract Objective The Dat'AIDS score was developed to predict 5‐year mortality risk in people living with HIV aged 60 and older. However, its validity in people living with HIV aged 70 years and older needed confirmation. Methods This was a multicentre prospective cohort study in the Dat'AIDS French cohort.
Abeo Mousse   +337 more
wiley   +1 more source

Comment on “Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things”

open access: yesIEEE Access, 2018
In this comment paper, we point out a security flaw in a data access control system which is built on ciphertext-policy attribute-based encryption (CP-ABE) and attribute-based signature schemes.
Syh-Yuan Tan
doaj   +1 more source

A Cluster of CP-ABE Microservices for VANET

open access: yesProcedia Computer Science, 2019
Abstract The promising high data rate of a 5G network enables the reality of Vehicular Ad Hoc Networks (VANET). VANETS are ad-hoc networks and they have limited resources. Providing the confidentiality of data by an access control system in a highly dynamic and automated network is a major challenge.
Mohammad Bany Taha   +2 more
openaire   +1 more source

Cas9‐Embedding Hyperactive TadA8e Confers Efficient and Highly Specific A‐To‐G Base Editing in Rice

open access: yesPlant Biotechnology Journal, EarlyView.
ABSTRACT Adenine base editors (ABEs) produce precise A‐to‐G conversion in the genomic target sites without causing double‐strand breaks. However, the hyperactive adenosine deaminase TadA8e raises safety concerns on genome‐wide off‐target edits. We engineered 11 chimeric proteins for ABEs (CP‐ABEs) by embedding hyperactive TadA8e within Cas9 nickase to ...
Jianjian Hu   +14 more
wiley   +1 more source

Black Box Traceable Ciphertext Policy Attribute-Based Encryption Scheme

open access: yesInformation, 2015
In the existing attribute-based encryption (ABE) scheme, the authority (i.e., private key generator (PKG)) is able to calculate and issue any user’s private key, which makes it completely trusted, which severely influences the applications of the ABE ...
Xingbing Fu, Xuyun Nie, Fagen Li
doaj   +1 more source

Effects of tempol on renal medullary tissue hypoxia in an ovine model of Gram‐negative septic acute kidney injury

open access: yesExperimental Physiology, EarlyView.
Abstract Renal arterial infusion of tempol (RAT) at the onset of Gram‐negative sepsis can prevent sepsis‐induced medullary tissue hypoxia and acute kidney injury (AKI). However, it is not known whether treatment with tempol at a clinically relevant time point of sepsis is similarly effective. Thus, we examined whether tempol can reverse renal medullary
Rachel Peiris   +10 more
wiley   +1 more source

Home - About - Disclaimer - Privacy