Results 51 to 60 of about 5,378 (199)

Quantifying Protein–Glycan Interactions Using Native Mass Spectrometry

open access: yesMass Spectrometry Reviews, EarlyView.
ABSTRACT Interactions between glycan‐binding proteins (GBPs) and carbohydrates (glycans) are essential to many biological processes relevant to human health and disease. For most GBPs, however, their glycan interactome—the repertoire of glycans recognized and their specificities—is poorly defined.
Duong T. Bui   +4 more
wiley   +1 more source

Comment on “Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things”

open access: yesIEEE Access, 2018
In this comment paper, we point out a security flaw in a data access control system which is built on ciphertext-policy attribute-based encryption (CP-ABE) and attribute-based signature schemes.
Syh-Yuan Tan
doaj   +1 more source

A Cluster of CP-ABE Microservices for VANET

open access: yesProcedia Computer Science, 2019
Abstract The promising high data rate of a 5G network enables the reality of Vehicular Ad Hoc Networks (VANET). VANETS are ad-hoc networks and they have limited resources. Providing the confidentiality of data by an access control system in a highly dynamic and automated network is a major challenge.
Mohammad Bany Taha   +2 more
openaire   +1 more source

Nutritional properties, traditional uses and potential new applications for the sotol plant (Asparagaceae, Convallarioideae): A review

open access: yesPLANTS, PEOPLE, PLANET, EarlyView.
Sotol (Dasylirion spp.) is a resilient desert plant that sustains ecosystems, cultures and livelihoods in Chihuahua Desert. Our review highlights its nutritional properties, traditional uses and potential new applications in food, pharmaceuticals, renewable energy and water remediation. By synthesizing evidence across disciplines, we show how sotol can
Dámaris Leopoldina Ojeda Barrios   +7 more
wiley   +1 more source

ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments [PDF]

open access: yes, 2013
The enforcement of security policies in outsourced environments is still an open challenge for policy-based systems. On the one hand, taking the appropriate security decision requires access to the policies.
Asghar, Muhammad Rizwan   +3 more
core   +1 more source

A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis   +7 more
wiley   +1 more source

Black Box Traceable Ciphertext Policy Attribute-Based Encryption Scheme

open access: yesInformation, 2015
In the existing attribute-based encryption (ABE) scheme, the authority (i.e., private key generator (PKG)) is able to calculate and issue any user’s private key, which makes it completely trusted, which severely influences the applications of the ABE ...
Xingbing Fu, Xuyun Nie, Fagen Li
doaj   +1 more source

Expressive CP-ABE with partially hidden access structures

open access: yesProceedings of the 7th ACM Symposium on Information, Computer and Communications Security, 2012
At Eurocrypt 2005, Sahai and Waters [7] introduced the concept of attribute-based encryption (ABE). ABE enables public key based one-to-many encryption and is envisioned as a promising cryptographic primitive for realizing scalable and fine-grained access control systems.
LAI, Junzuo   +2 more
openaire   +3 more sources

Patient‐reported outcomes, postoperative pain and pain relief after day‐case surgery (POPPY): short‐term peri‐operative analgesic use

open access: yesAnaesthesia, EarlyView.
Summary Introduction An increasing proportion of complex surgical procedures are being performed in the UK as day‐cases, with variable and limited follow up. Discharge prescriptions must provide adequate analgesia, while considering the safety of the patient and public, following best practice guidance and good opioid stewardship.
Anna Ratcliffe   +2083 more
wiley   +1 more source

Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts

open access: yesIEEE Access, 2017
Designing lightweight security protocols for cloud-based Internet-of-Things (IoT) applications for battery-limited mobile devices, such as smart phones and laptops, is a topic of recent focus.
Vanga Odelu   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy