Results 41 to 50 of about 3,111 (159)

A trusted medical data sharing framework for edge computing leveraging blockchain and outsourced computation

open access: yesHeliyon, 2023
Traditional cloud-centric approaches to medical data sharing pose risks related to real-time performance, security, and stability. Medical and healthcare data encounter challenges like data silos, privacy breaches, and transmission latency.
Gaoyuan Quan   +6 more
doaj   +1 more source

Expressive CP-ABE with partially hidden access structures

open access: yesProceedings of the 7th ACM Symposium on Information, Computer and Communications Security, 2012
At Eurocrypt 2005, Sahai and Waters [7] introduced the concept of attribute-based encryption (ABE). ABE enables public key based one-to-many encryption and is envisioned as a promising cryptographic primitive for realizing scalable and fine-grained access control systems.
LAI, Junzuo   +2 more
openaire   +3 more sources

Patient‐reported outcomes, postoperative pain and pain relief after day‐case surgery (POPPY): baseline data from day surgery practice in the UK

open access: yesAnaesthesia, Volume 81, Issue 4, Page 477-488, April 2026.
Summary Introduction Most patients undergoing elective surgery in the UK are discharged from hospital on the same day. Despite this, there is a lack of UK patient‐centred outcome measures relating to quality of recovery, pain and analgesic use. The POPPY study was a UK‐wide prospective, observational study measuring short‐ and longer‐term patient ...
Martha Belete   +2177 more
wiley   +1 more source

Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts

open access: yesIEEE Access, 2017
Designing lightweight security protocols for cloud-based Internet-of-Things (IoT) applications for battery-limited mobile devices, such as smart phones and laptops, is a topic of recent focus.
Vanga Odelu   +4 more
doaj   +1 more source

Updating attribute in CP-ABE: A New Approach

open access: yes, 2012
In Ciphertext-Policy Attribute Based Encryption (CP-ABE), attributes are attached to the user's secret key and access policy is at-tached to the ciphertext. If attributes in the secret key of a user satisfy the policy then only the genuine user can decrypt the ciphertext. However, such scenario also necessitates periodic updating of the secret key with
Doshi, Nishant, Jinwala, Devesh
openaire   +2 more sources

Patient‐reported outcomes, postoperative pain and pain relief after day‐case surgery (POPPY): chronic post‐surgical pain prevalence and associations*

open access: yesAnaesthesia, Volume 81, Issue 4, Page 489-499, April 2026.
Summary Introduction Day‐case surgical activity is increasing in the UK yet there is a lack of data on the prevalence of chronic post‐surgical pain in this population. This study uses data from the POPPY study to estimate the prevalence of chronic post‐surgical pain after day‐case surgery, its relationship with quality of life and also explores ...
Adam B. Brayne   +2177 more
wiley   +1 more source

SECURED DATA RETRIEVAL IN MILITARY APPLICATIONS USING CP-ABE

open access: yesEPH - International Journal of Science And Engineering, 2021
Disruption-tolerant network (DTN) technologies are only solutions for military environment because of their mobile nodes irregular network connectivity and frequent partitions. But due to its nature of having external storage node during the transmission there is chance of getting exploited.
null Persi Pamela I   +2 more
openaire   +1 more source

Mitochondrial Ca2+ overload is a pivotal risk factor for lethal ventricular arrhythmias due to the oxidation of mitochondrial respirasome and energetic failure

open access: yesBritish Journal of Pharmacology, Volume 183, Issue 7, Page 1404-1426, April 2026.
The data that support the findings of this study are available from the corresponding author upon reasonable request. Some data may not be made available because of privacy or ethical restrictions. Background and Purpose Ventricular arrhythmias are a leading cause of death among patients with cardiovascular diseases and are associated with elevated ...
Felipe de Jesús Salazar‐Ramírez   +13 more
wiley   +1 more source

An Efficient Hierarchical Multi-Authority Attribute Based Encryption Scheme for Profile Matching using a Fast Ate Pairing in Cloud Environment

open access: yesJournal of Communications Software and Systems, 2018
In cloud environment, profile matching is a key technique in applications such as health care and social networks. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is suitable technique for data sharing in such environments.
Balaji Chandrasekaran   +2 more
doaj  

Genetic Basis of Cuticular Hydrocarbon Variation in the Desert Ant Cataglyphis niger

open access: yesEcology and Evolution, Volume 16, Issue 3, March 2026.
Cuticular hydrocarbons (CHCs) are a ubiquitous component of ant cuticles that are used for a wide range of chemical signaling functions, especially recognition. Here we tested for a genetic basis of CHC variation in the desert ant Cataglyphis niger. We applied a genomic mapping approach to discover associations between CHCs and 20 quantitative trait ...
Shani Inbar   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy