Results 81 to 90 of about 3,657 (190)
Christian Bohr. Discoverer of Homotropic and Heterotopic Allostery
ABSTRACT This essay recounts and revisits the scientific contributions of Christian Bohr, highlighting his pivotal role in discovering allostery about 120 years ago. Bohr's meticulous experimentation led to identifying two distinct forms of allostery: homotropic (single‐ligand) and heterotropic (multi‐ligand), the latter widely recognized as the Bohr ...
Niels Bindslev
wiley +1 more source
The Network’s Data Security Risk Analysis [PDF]
Establishing the networks security risk can be a very difficult operation especially for the small companies which, from financial reasons can’t appeal at specialist in this domain, or for the medium or large companies that don’t have experience.
Emil BURTESCU
core
The Costs of Deception: Evidence From Psychology [PDF]
Recently, it has been argued that the evidence in social science research suggests that deceiving subjects in an experiment does not lead to a significant loss of experimental control.
Andreas Ortmann, Ralph Hertwig
core
Blockchain-Based Data Access Control and Key Agreement System in IoT Environment. [PDF]
Lee J +6 more
europepmc +1 more source
Cryptanalysis and Improvement of Several Identity-Based Authenticated and Pairing-Free Key Agreement Protocols for IoT Applications. [PDF]
Sun H, Li C, Zhang J, Liang S, Huang W.
europepmc +1 more source
A Secure Data-Sharing Model Resisting Keyword Guessing Attacks in Edge–Cloud Collaboration Scenarios
In edge–cloud collaboration scenarios, data sharing is a critical technological tool, yet smart devices encounter significant challenges in ensuring data-sharing security. Attribute-based keyword search (ABKS) is employed in these contexts to facilitate fine-grained access control over shared data, allowing only users with the necessary privileges to ...
Ye Li +4 more
openaire +1 more source
Protecting the privacy of keywords in the field of search over outsourced cloud data is a challenging task. In IEEE Transactions on Services Computing (Vol. 17 No. 2, March/April 2024), Li et al.
Varri, Uma Sankararao
core
EStore: A User-Friendly Encrypted Storage Scheme for Distributed File Systems. [PDF]
Chen Y, Dong G, Xu C, Hao Y, Zhao Y.
europepmc +1 more source
Public Key Encryption with Keyword Search in Cloud: A Survey. [PDF]
Zhou Y, Li N, Tian Y, An D, Wang L.
europepmc +1 more source
A Review of Functional Encryption in IoT Applications. [PDF]
Shahzad K, Zia T, Qazi EU.
europepmc +1 more source

