Results 321 to 330 of about 93,492 (364)
Some of the next articles are maybe not open access.
IEEE Transactions on Dependable and Secure Computing
Outsourcing the heavy decryption computation to a cloud service provider has been a promising solution for a resource-constrained mobile device to deploy an attribute-based encryption scheme.
Chunpeng Ge +4 more
semanticscholar +1 more source
Outsourcing the heavy decryption computation to a cloud service provider has been a promising solution for a resource-constrained mobile device to deploy an attribute-based encryption scheme.
Chunpeng Ge +4 more
semanticscholar +1 more source
Quantized Distributed Economic Dispatch for Microgrids: Paillier Encryption–Decryption Scheme
IEEE Transactions on Industrial InformaticsThis article is concerned with the secure distributed economic dispatch (DED) problem of microgrids. A quantized distributed optimization algorithm using the Paillier encryption–decryption scheme is developed.
Wei Chen +4 more
semanticscholar +1 more source
Onychocryptosis – decrypting the controversies
International Journal of Dermatology, 2020AbstractOnychocryptosis, or ingrown toenail, is a frequent, painful condition affecting young individuals. Controversies still exist regarding its etiopathogenesis and treatment options, including conservative and surgical techniques. The choice of treatment method depends on the stage of disease as conservative measures are mostly effective in early ...
Vishal Thakur +2 more
openaire +2 more sources
Backdoor Attack on Deep Learning-Based Medical Image Encryption and Decryption Network
IEEE Transactions on Information Forensics and SecurityMedical images often contain sensitive information, and one typical security measure is to encrypt medical images prior to storage and analysis. A number of solutions, such as those utilizing deep learning, have been proposed for medical image encryption
Yi Ding +6 more
semanticscholar +1 more source
IEEE Journal on Selected Areas in Communications, 2021
The rapid development of the Internet of Things (IoT) has led to the emergence of more and more novel applications in recent years. One of them is the e-health system, which can provide people with high-quality and convenient health care.
Yudi Zhang +4 more
semanticscholar +1 more source
The rapid development of the Internet of Things (IoT) has led to the emergence of more and more novel applications in recent years. One of them is the e-health system, which can provide people with high-quality and convenient health care.
Yudi Zhang +4 more
semanticscholar +1 more source
Dimerization decrypts antibiotic activity
Science, 2022Direct dimerization simplifies the synthesis of himastatin and elucidates its mode of ...
openaire +2 more sources
Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain
IEEE Transactions on Information Forensics and Security, 2020The concept of functional encryption (FE) has been introduced to address the shortcomings of public-key encryption (PKE) in many emerging applications which require both data storage and data sharing (e.g., cloud storage service). One of the major issues
Hui Cui +4 more
semanticscholar +1 more source
This book deploys the theory of encryption of to decrypt justice, setting in opposition Justice, written with the hegemonic capital letters of Western ideas, and justice, in its everyday workings within disparate communal forms and the exercise of multiplicity.
+4 more sources
+4 more sources
IEEE Transactions on Services Computing, 2020
Remote data access control is of crucial importance in public cloud. Based on its own inclinations, the data owner predefines the access policy. When the user satisfies the data owner's access policy, it has the right to access the data owner's remote ...
Huaqun Wang, De-biao He, Jinguang Han
semanticscholar +1 more source
Remote data access control is of crucial importance in public cloud. Based on its own inclinations, the data owner predefines the access policy. When the user satisfies the data owner's access policy, it has the right to access the data owner's remote ...
Huaqun Wang, De-biao He, Jinguang Han
semanticscholar +1 more source
ACM SIGCOMM Computer Communication Review, 2005
This short paper introduces wireless IEEE 802 standards and activities with a focus on explaining the purpose of the many 802.11 amendments.
openaire +1 more source
This short paper introduces wireless IEEE 802 standards and activities with a focus on explaining the purpose of the many 802.11 amendments.
openaire +1 more source

