Results 61 to 70 of about 3,665 (174)

Pairing‐Free Certificateless Searchable Public Key Encryption Scheme Resistant to Frequency Analysis for IIOT

open access: yesIET Communications, Volume 20, Issue 1, January/December 2026.
This paper proposes a novel lightweight certificateless public key authentication with keyword search (CPAEKS) scheme tailored for IIoT environments, effectively addressing data confidentiality and retrieval efficiency. The scheme resists frequency analysis attacks, removes reliance on bilinear pairings, and eliminates key escrow and certificate ...
Kaiqi Liu   +3 more
wiley   +1 more source

Identifying a Game Console Vulnerability and Potential Exploitation for eBusiness Attacks [PDF]

open access: yes, 2014
Game Information System (IS) consoles are used by millions of players at any one time to access the Internet and information resources. In this research we questioned the security of these systems and evaluated one identified vulnerability for the ...
Cusack, Brian, Robinson, Nick
core  

Blockchain‐Enabled Privacy‐Preserving Access Control for EHRs Sharing With Optimized User and Attribute Revocation

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Electronic health records (EHRs) have become a crucial application in cloud computing environments, necessitating advanced privacy‐preserving access control mechanisms. Ciphertext policy attribute‐based encryption (CP‐ABE) is a widely recognized solution for secure access control in outsourced data environments.
Khanadech Worapaluk   +2 more
wiley   +1 more source

An Efficient Lattice-Based Verifiable Public-Key Authenticated Encryption With Keyword Search Scheme

open access: yesIEEE Access
Searchable encryption enables efficient retrieval of encrypted data stored in cloud environments while preserving data confidentiality. Within this context, Public Key Encryption with Keyword Search (PEKS) allows data users to perform keyword-based ...
Saba Karimani, Taraneh Eghlidos
doaj   +1 more source

AMRerank: A Framework for Library Migration Recommendations Using Multi‐Agent Analysis and Data‐Driven Reranking

open access: yesIET Software, Volume 2026, Issue 1, 2026.
Open‐source libraries are indispensable for modern software development but can create substantial maintenance burdens when they become deprecated or unmaintained. Selecting an appropriate replacement among many candidates remains challenging, since methods relying only on historical mining or similarity metrics often miss subtle differences in meaning.
Jie Luo   +3 more
wiley   +1 more source

Safety and Efficacy of Eslicarbazepine Acetate in Children Diagnosed With a Focal Seizure Disorder: A Systematic Review and Meta‐Analysis

open access: yesBrain and Behavior, Volume 15, Issue 12, December 2025.
ABSTRACT Background Epilepsy can have a negative impact on cognitive and social functioning. Eslicarbazepine acetate (ESL) is used to treat focal seizures, although its safety and efficacy, particularly as an additional treatment, warrant more study.
Neha Bhagwan Das   +9 more
wiley   +1 more source

Efficient k-Resilient Public Key Authenticated Encryption with Keyword Search

open access: yesJournal of Cybersecurity and Privacy
Traditional encryption prioritises confidentiality but complicates search operations, requiring decryption before searches can be conducted. The public key encryption with keyword search (PEKS) scheme addresses this limitation by enabling authorised ...
Koon-Ming Chan   +3 more
doaj   +1 more source

Atomistic Modeling of Methyl Formate and Glycolaldehyde Formation on Interstellar Dirty Ice Mantles via a “Radical + Ice” Mechanism

open access: yesChemPlusChem, Volume 90, Issue 11, November 10, 2025.
The presence of interstellar complex organic molecules (COMs) has been baffling astrochemists for a long time. Methyl formate and glycolaldehyde are widely detected but their abundances mismatch kinetic astrochemical model predictions. Here, the formation of these two COMs is characterized onto a mixed ice surface, highlighting the importance of ...
Jessica Perrero   +3 more
wiley   +1 more source

AAPM WGTEACH Report 366: Best practices in the teaching and mentoring of medical physics

open access: yesJournal of Applied Clinical Medical Physics, Volume 26, Issue 10, October 2025.
Abstract Working Group on Teaching Educators and Clinicians How (WGTEACH) has been charged with writing a report to review best, evidence‐based practices in various aspects of the teaching of medical physics. These aspects include not only didactic teaching and mentoring in the classroom and clinic, but also teaching K‐12 and undergraduate students and
Victor J. Montemayor   +13 more
wiley   +1 more source

Heavy‐element damage seeding in proteins under XFEL illumination

open access: yesJournal of Synchrotron Radiation, Volume 32, Issue 5, Page 1124-1142, September 2025.
Plasma simulations with detailed modeling of unbound electron dynamics predict that heavy elements contribute significantly to radiation damage suffered by proteins in serial femtosecond crystallography. New methods to mitigate radiation damage in this regime are highlighted.Serial femtosecond X‐ray crystallography (SFX) captures the structure and ...
Spencer K. Passmore   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy