Results 321 to 330 of about 93,492 (364)
Some of the next articles are maybe not open access.

Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract

IEEE Transactions on Dependable and Secure Computing
Outsourcing the heavy decryption computation to a cloud service provider has been a promising solution for a resource-constrained mobile device to deploy an attribute-based encryption scheme.
Chunpeng Ge   +4 more
semanticscholar   +1 more source

Quantized Distributed Economic Dispatch for Microgrids: Paillier Encryption–Decryption Scheme

IEEE Transactions on Industrial Informatics
This article is concerned with the secure distributed economic dispatch (DED) problem of microgrids. A quantized distributed optimization algorithm using the Paillier encryption–decryption scheme is developed.
Wei Chen   +4 more
semanticscholar   +1 more source

Onychocryptosis – decrypting the controversies

International Journal of Dermatology, 2020
AbstractOnychocryptosis, or ingrown toenail, is a frequent, painful condition affecting young individuals. Controversies still exist regarding its etiopathogenesis and treatment options, including conservative and surgical techniques. The choice of treatment method depends on the stage of disease as conservative measures are mostly effective in early ...
Vishal Thakur   +2 more
openaire   +2 more sources

Backdoor Attack on Deep Learning-Based Medical Image Encryption and Decryption Network

IEEE Transactions on Information Forensics and Security
Medical images often contain sensitive information, and one typical security measure is to encrypt medical images prior to storage and analysis. A number of solutions, such as those utilizing deep learning, have been proposed for medical image encryption
Yi Ding   +6 more
semanticscholar   +1 more source

Efficient Identity-Based Distributed Decryption Scheme for Electronic Personal Health Record Sharing System

IEEE Journal on Selected Areas in Communications, 2021
The rapid development of the Internet of Things (IoT) has led to the emergence of more and more novel applications in recent years. One of them is the e-health system, which can provide people with high-quality and convenient health care.
Yudi Zhang   +4 more
semanticscholar   +1 more source

Dimerization decrypts antibiotic activity

Science, 2022
Direct dimerization simplifies the synthesis of himastatin and elucidates its mode of ...
openaire   +2 more sources

Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain

IEEE Transactions on Information Forensics and Security, 2020
The concept of functional encryption (FE) has been introduced to address the shortcomings of public-key encryption (PKE) in many emerging applications which require both data storage and data sharing (e.g., cloud storage service). One of the major issues
Hui Cui   +4 more
semanticscholar   +1 more source

Decrypting Justice

This book deploys the theory of encryption of to decrypt justice, setting in opposition Justice, written with the hegemonic capital letters of Western ideas, and justice, in its everyday workings within disparate communal forms and the exercise of multiplicity.
  +4 more sources

VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud

IEEE Transactions on Services Computing, 2020
Remote data access control is of crucial importance in public cloud. Based on its own inclinations, the data owner predefines the access policy. When the user satisfies the data owner's access policy, it has the right to access the data owner's remote ...
Huaqun Wang, De-biao He, Jinguang Han
semanticscholar   +1 more source

802.11 "decrypted"

ACM SIGCOMM Computer Communication Review, 2005
This short paper introduces wireless IEEE 802 standards and activities with a focus on explaining the purpose of the many 802.11 amendments.
openaire   +1 more source

Home - About - Disclaimer - Privacy