Research on platform data security governance strategy based on three-party evolutionary game. [PDF]
Tian Z, Han M, Jiang C.
europepmc +1 more source
Lightweight Security Framework for Data Outsourcing and Storage in Mobile Cloud Computing
Manzamasso KPELOU, Keshav Kishore
openalex +1 more source
A hybrid anode composed of Cl‐functionalized curved nanographene and graphite enables ultra‐fast charging and long cycle life through an engineered morphology and sequential Li+ insertion. It delivers 100 mAh g−1 at 5 C with 70% capacity retention after 1000 cycles and maintains stable performance over 2000 cycles in pouch cells, providing a practical ...
Hyunji Cha +8 more
wiley +1 more source
Digital health data security practices among health professionals in low-resource settings: cross-sectional study in Amhara Region, Ethiopia. [PDF]
Gebeyew AS +8 more
europepmc +1 more source
Inout Secure DB: Maximizing Security for Data INside and OUTside the Database
Luiz Gomes-Jr +4 more
openalex +1 more source
Enhanced Data Security with Magic Rectangle and Genetic Algorithm
Monali G. Pawar +3 more
openalex +1 more source
Free‐Form Microfluidic Microneedle Array Patches
Microfluidic microneedle array patches (MAPs) integrate hollow microneedles with embedded microfluidic channels, fabricated using high‐resolution 3D printing, to enable controlled transdermal delivery of liquid, mixed, or reconstituted therapeutics.
Ian A. Coates +11 more
wiley +1 more source
Systematic survey on data security in wireless body area networks in IoT healthcare system. [PDF]
Jian W, Tabassum A, Li JP.
europepmc +1 more source
Light‐Responsive Enzyme‐Loaded Nanoparticles for Tunable Adhesion and Mechanical Wound Contraction
This study presents a photoactivatable enzyme‐loaded mesoporous nanoparticle system (MPDA_PaTy) that enables light‐triggered tunable tissue adhesion and facilitates mechanical wound contraction. Controlled enzymatic crosslinking at tissue or hydrogel interfaces allows on‐demand adhesion.
Junghyeon Ko +10 more
wiley +1 more source
IoT data security in outsourced databases: A survey of verifiable database. [PDF]
Chen A, Yu S, Yang X, Huang D, Ren Y.
europepmc +1 more source

