Results 71 to 80 of about 22,366 (192)

Enhancing Data Privacy and Trust in E‐Learning: A Blockchain‐Based Access Control Protocol for Cloud Educational Systems

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 18-20, 30 August 2025.
ABSTRACT E‐learning systems in an educational environment designed for wireless area networks for schools, universities, and research institutions provide consistency and better retention for students, professors, and researchers. An E‐learning system is known for storing lecture documents and live video conferences that are transmitted over public ...
Ahmed A. Mawgoud   +4 more
wiley   +1 more source

A NOVEL AND CAPABLE SCHEME ASSURANCE DATA PRIVACY OF ENCRYPTION CATEGORY [PDF]

open access: yes, 2018
During this paper, we must have another critical property of smooth projective hash functions. We introduce two games, namely semantic-security against selected keyword attack as well as in distinguish ability against keyword guessing attack1 to capture ...
Kavitha, B., Kumar, Dr. Y.Ravi
core  

The sense that we're invisible: A longitudinal analysis of diverse women's experiences with structural violence in biomedical doctoral programs

open access: yesJournal of Research in Science Teaching, Volume 62, Issue 6, Page 1492-1521, August 2025.
Abstract A longstanding and significant disparity in representation across gender, economic status, ethnicity, race, and sexual identity exists within STEM doctoral training. Most of the research on the retention and attrition of minoritized PhD STEM students focuses on individual factors, rather than system level issues.
Ida Salusky   +4 more
wiley   +1 more source

Identifying a Game Console Vulnerability and Potential Exploitation for eBusiness Attacks [PDF]

open access: yes, 2014
Game Information System (IS) consoles are used by millions of players at any one time to access the Internet and information resources. In this research we questioned the security of these systems and evaluated one identified vulnerability for the ...
Cusack, Brian, Robinson, Nick
core  

Zero Trust Architecture as a Risk Countermeasure in Small–Medium Enterprises and Advanced Technology Systems

open access: yesRisk Analysis, Volume 45, Issue 8, Page 2390-2414, August 2025.
Abstract The growing sophistication of cyberattacks exposes small‐ and medium‐sized businesses (SMBs) to a widening range of security risks. As these threats evolve in complexity, the need for advanced security measures becomes increasingly pressing. This necessitates a proactive approach to defending against potential cyber intrusions.
Ahmed M. Abdelmagid, Rafael Diaz
wiley   +1 more source

Christian Bohr. Discoverer of Homotropic and Heterotopic Allostery

open access: yesActa Physiologica, Volume 241, Issue S734, July 2025.
ABSTRACT This essay recounts and revisits the scientific contributions of Christian Bohr, highlighting his pivotal role in discovering allostery about 120 years ago. Bohr's meticulous experimentation led to identifying two distinct forms of allostery: homotropic (single‐ligand) and heterotropic (multi‐ligand), the latter widely recognized as the Bohr ...
Niels Bindslev
wiley   +1 more source

Wearable sensors in paediatric neurology

open access: yesDevelopmental Medicine &Child Neurology, Volume 67, Issue 7, Page 834-853, July 2025.
Types of signals monitored in children's natural environments using wearable sensors, and their associated applications in various paediatric neurological conditions. Plain language summary: https://onlinelibrary.wiley.com/doi/10.1111/dmcn.16267 Abstract Wearable sensors have the potential to transform diagnosis, monitoring, and management of children ...
Camila González Barral, Laurent Servais
wiley   +1 more source

An Efficient Lattice-Based Verifiable Public-Key Authenticated Encryption With Keyword Search Scheme

open access: yesIEEE Access
Searchable encryption enables efficient retrieval of encrypted data stored in cloud environments while preserving data confidentiality. Within this context, Public Key Encryption with Keyword Search (PEKS) allows data users to perform keyword-based ...
Saba Karimani, Taraneh Eghlidos
doaj   +1 more source

PUBLIC KEY ENCRYPTION WITH KEY EXPLORATION FOR SECURED DISTRACT DOUBLE SERVER REPOSITORY [PDF]

open access: yes, 2018
One of the key components of our build-to-encrypt general two-key files with keyword search is the function of projection jammers without problems, an idea created by Kramer and Chop.
Fatima, Syeda Asma, Jayachandran, Dr.
core  

Leadership in Scholarship: Editors' Appointments and Scientific Narrative

open access: yesScottish Journal of Political Economy, Volume 72, Issue 3, July 2025.
ABSTRACT Academic journals disseminate new knowledge and therefore can influence the direction and composition of ongoing research by choosing what to publish. We study the change in the topic structure of papers published in the American Economic Review (AER) after the appointments of editors and coeditors of the AER between 1985 and 2011 using a ...
Ali Sina Önder   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy