Results 161 to 170 of about 11,893 (260)
DS-CKDSE: A Dual-Server Conjunctive Keyword Dynamic Searchable Encryption with Forward and Backward Security. [PDF]
Sun H, Liu Y, Zhang Y, Li C.
europepmc +1 more source
HiFiCCL, as the first assembly framework specifically designed for low‐coverage high‐fidelity reads, improves the assembly quality of existing assemblers and also enhances downstream applications such as large structural variant (SV) detection (>10 000 bp), synteny analysis, pangenome graph construction, and graph‐based individual‐specific germline SVs
Zhongjun Jiang +9 more
wiley +1 more source
Privacy-Preserving ECC-Based AKA for Resource-Constrained IoT Sensor Networks with Forgotten Password Reset. [PDF]
Yu Y, Wei K, Qi K, Wu W.
europepmc +1 more source
Trends and Insights in Arab Audit Research: A Bibliometric Exploration
ABSTRACT This study employs bibliometric analysis to investigate audit research trends across five Arab countries—Jordan, Saudi Arabia, Egypt, Tunisia and the United Arab Emirates—each reflecting distinct sociopolitical, economic and legal contexts.
Zouhour Ben Hamadi, Peter Ghattas
wiley +1 more source
Decentralizing video copyright protection: a novel blockchain-enabled framework with performance evaluation. [PDF]
Madapati SL, Pradhan NR.
europepmc +1 more source
Disproportionality analyses suggested a cardiovascular risk signal for romosozumab, while statistically significant associations were not found in the real‐world database studies. Therefore, a larger comparative study was necessary to examine this signal.
Hotaka Maruyama +5 more
wiley +1 more source
A Lightweight Authentication and Key Distribution Protocol for XR Glasses Using PUF and Cloud-Assisted ECC. [PDF]
Cha W, Lee HJ, Kook S, Kim K, Won D.
europepmc +1 more source
This study presents a dual‐layered anonymization model combining BioClinicalBERT and polyalphabetic cipher to accurately identify and protect sensitive healthcare data. It achieves strong F1 scores while maintaining data utility, enabling privacy‐preserving clinical research compliant with GDPR and HIPAA regulations.
Deblina Mazumder Setu +3 more
wiley +1 more source
A Post-Quantum Secure RFID Authentication Protocol Based on NTRU Encryption Algorithm. [PDF]
Liu H, Wu H, Ge N, Dong Q.
europepmc +1 more source

