Results 41 to 50 of about 2,018 (260)

Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency [PDF]

open access: yes, 2017
Recently, several practical attacks raised serious concerns over the security of searchable encryption. The attacks have brought emphasis on forward privacy, which is the key concept behind solutions to the adaptive leakage-exploiting attacks, and will ...
Dong, Changyu   +4 more
core   +1 more source

Providing User Security Guarantees in Public Infrastructure Clouds [PDF]

open access: yes, 2016
The infrastructure cloud (IaaS) service model offers improved resource flexibility and availability, where tenants - insulated from the minutiae of hardware maintenance - rent computing resources to deploy and operate complex systems.
Gehrmann, C.   +5 more
core   +2 more sources

Predicting Atomic Charges in MOFs by Topological Charge Equilibration

open access: yesAdvanced Functional Materials, EarlyView.
An atomic charge prediction method is presented that is able to accurately reproduce ab‐initio‐derived reference charges for a large number of metal–organic frameworks. Based on a topological charge equilibration scheme, static charges that fulfill overall neutrality are quickly generated.
Babak Farhadi Jahromi   +2 more
wiley   +1 more source

Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control

open access: yesJournal of Sensor and Actuator Networks
Untrusted servers are servers or storage entities lacking complete trust from the data owner or users. This characterization implies that the server hosting encrypted data may not enjoy full trust from data owners or users, stemming from apprehensions ...
Salim Sabah Bulbul   +5 more
doaj   +1 more source

Imaging of Biphoton States: Fundamentals and Applications

open access: yesAdvanced Functional Materials, EarlyView.
Quantum states of two photons exhibit a rich polarization and spatial structure, which provides a fundamental resource of strongly correlated and entangled states. This review analyzes the physics of these intriguing properties and explores the various techniques and technologies available to measure them, including the state of the art of their ...
Alessio D'Errico, Ebrahim Karimi
wiley   +1 more source

Privacy-Preserving Genetic Relatedness Test [PDF]

open access: yes, 2016
An increasing number of individuals are turning to Direct-To-Consumer (DTC) genetic testing to learn about their predisposition to diseases, traits, and/or ancestry. DTC companies like 23andme and Ancestry.com have started to offer popular and affordable
De Cristofaro, Emiliano   +2 more
core   +1 more source

Forward-secure hierarchical predicate encryption [PDF]

open access: yes, 2012
Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. \emph{Forward Security (FS)}, introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz
Gonzalez Nieto, Juan   +2 more
core   +2 more sources

Nanothermometry in Living Cells: Physical Limits, Conceptual and Material Challenges

open access: yesAdvanced Functional Materials, EarlyView.
Heat and temperature are fundamental to life. When nanothermometers began probing regions as small as a living cell, they triggered controversial claims of large intracellular temperature gradients. We review physical constraints energy‐conservation, entropy production, thermodynamic fluctuations, and molecular dynamics.
Taras Plakhotnik
wiley   +1 more source

State of The Art and Hot Aspects in Cloud Data Storage Security [PDF]

open access: yes, 2013
Along with the evolution of cloud computing and cloud storage towards matu- rity, researchers have analyzed an increasing range of cloud computing security aspects, data security being an important topic in this area.
Gehrmann, Christian   +2 more
core   +3 more sources

Split keyword fuzzy and synonym search over encrypted cloud data [PDF]

open access: yes, 2017
A substitute solution for various organizations of data owners to store their data in the cloud using storage as a service(SaaS). The outsourced sensitive data is encrypted before uploading into the cloud to achieve data privacy.
Buyya., R.   +6 more
core   +1 more source

Home - About - Disclaimer - Privacy