Results 101 to 110 of about 4,948 (274)

Exploiting Hidden Information Leakages in Backward Privacy for Dynamic Searchable Symmetric Encryption

open access: yesApplied Sciences
Dynamic searchable symmetric encryption (DSSE) enables searches over encrypted data as well as data dynamics such as flexible data addition and deletion operations.
Hyundo Yoon   +4 more
doaj   +1 more source

Dynamic searchable symmetric encryption

open access: yes, 2015
The subject of this thesis is "Dynamic Searchable Symmetric Encryption" (DSSE). DSSE is one of the solutions that can be used for implementations of searchable encryption schemes. Searchable encryption allows a client to outsource the storage of its encrypted data to a server, while maintaining the ability to search over the data without downloading it.
openaire   +1 more source

Engineered Living Systems With Self‐Organizing Neural Networks: From Anatomy to Behavior and Gene Expression

open access: yesAdvanced Science, EarlyView.
Ectodermal tissue excised from Xenopus embryos self‐organizes into a three‐dimensional mucociliary organoid. Here, we generate a neural variant, termed neurobot, by implanting neural precursor cells. Neurobots develop mature neurons, adopt distinct morphologies, exhibit more complex motility, and respond differentially to neuroactive compounds. Imaging
Haleh Fotowat   +6 more
wiley   +1 more source

A Bifunctional T3SS‐Effector Simultaneously Cleaves Host MAP Kinase and Inhibits PPM1A Phosphatase

open access: yesAdvanced Science, EarlyView.
Pathogenic bacteria exploit the metalloprotease effector NleD to subvert host defenses. Structural, biochemical, and infection analyses reveal a bifunctional mechanism by which NleD binds and inhibits the host phosphatase PPM1A while preserving its proteolytic activity against MAPKs.
Yaakov Socol   +18 more
wiley   +1 more source

A Bloom filter-based dynamic symmetric searchable encryption scheme over cloud data

open access: yesCybersecurity
In this paper, a searchable encryption scheme for cloud data is proposed to address the limitations of existing schemes, which suffer from inefficient index construction and search process, as well as a lack of support for dynamic updates or the ...
Xing Zhang   +4 more
doaj   +1 more source

ESPOON$_{{ERBAC}}$: Enforcing Security Policies In Outsourced Environments

open access: yes, 2013
Data outsourcing is a growing business model offering services to individuals and enterprises for processing and storing a huge amount of data. It is not only economical but also promises higher availability, scalability, and more effective quality of ...
Asghar, Muhammad Rizwan   +3 more
core  

RNF213 Is an Interferon‐Stimulated Gene That Targets Influenza A Virus NP and Activates MDA5 to Restrict Infection

open access: yesAdvanced Science, EarlyView.
RNF213 is characterized as a dual‐functional antiviral effector. It directly mediates the degradation of the influenza A virus nucleoprotein (NP) while simultaneously activating the MDA5‐mediated innate immune signaling pathway. This coordinated response establishes a powerful host defense system against viral infection. ABSTRACT Influenza A virus (IAV)
Haoning Li   +5 more
wiley   +1 more source

EVSEB: Efficient and Verifiable Searchable Encryption With Boolean Search for Encrypted Cloud Logs

open access: yesIEEE Access
With the growing adoption of cloud services, organizations are increasingly outsourcing their system log management to cloud service providers (CSPs). While this approach offers cost efficiency and scalability, it introduces critical challenges related ...
Somchart Fugkeaw   +3 more
doaj   +1 more source

AutomataGPT: Transformer‐Based Forecasting and Ruleset Inference for Two‐Dimensional Cellular Automata

open access: yesAdvanced Science, EarlyView.
We introduce AutomataGPT, a generative pretrained transformer (GPT) trained on synthetic spatiotemporal data from 2D cellular automata to learn symbolic rules. Demonstrating strong performance on both forward and inverse tasks, AutomataGPT establishes a scalable, domain‐agnostic framework for interpretable modeling, paving the way for future ...
Jaime A. Berkovich   +2 more
wiley   +1 more source

Enhancing Security and Efficiency: A Fine-Grained Searchable Scheme for Encryption of Big Data in Cloud-Based Smart Grids

open access: yesMathematics
The smart grid, as a crucial part of modern energy systems, handles extensive and diverse data, including inputs from various sensors, metering devices, and user interactions.
Jing Wen   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy