Results 31 to 40 of about 19,326 (124)
A Novel Methodology to Mitigate Keyword Guessing Attack using Keyword and Signature Hash
The importance of electronic data and its rapid growth leads to gradual increase to the data usage over the network servers and on the other side high priority is needed for the data security and privacy. The existing keyword search schemes for data retrieval from the centralized storage uses keyword as a valid parameter.
A. Gangaa +2 more
openaire +1 more source
Multi-Recipient encryption with keyword search without pairing for cloud storage
With the rapid development of cloud computing technology and communication technology, cloud storage has become a tool used by people in daily life. Cloud storage service enables users to outsource data to cloud servers and retrieve desired document ...
Ningbin Yang +3 more
doaj +1 more source
Application of keyword searchable encryption in cloud
Recently,some schemes combined keyword searchable encryption with attribute based encryption,solved access control problem in cloud environment,but they didn’t consider security problems like keyword guessing attack and security channels,so they couldn’t
Peng LIN, Jie JIANG, Tie-ming CHEN
doaj +2 more sources
Public Key Encryption with Equality Test in a Cloud Environment
With the rapid development and wide application of cloud computing and 5G communication, the number of mobile users is increasing rapidly, meaning that cloud storage services are receiving more and more attention.
Ping Zhang, Jinbo Li, Zhumu Fu
doaj +1 more source
Abstract This study examined second language vocabulary processing and learning in reading only (RO) versus reading while listening (RWL). 119 English learners read or read‐while‐listening to a story embedded with 25 pseudowords, 10 times each, and had their eye movements tracked.
Jonathan Malone +3 more
wiley +1 more source
With the rapid development of cloud computing technology, how to achieve secure access to cloud data has become a current research hotspot. Attribute-based encryption technology provides the feasibility to achieve the above goal.
Liang Yan +5 more
doaj +1 more source
Certificateless Searchable Encryption Scheme in Multi-User Environment
Searchable encryption technology enables users to access data that has been made publicly encrypted without divulging the original content. The majority of the currently available multi-user certificateless searchable encryption technologies are based on
Tao Feng, Jiewen Si
doaj +1 more source
Agents' Behavior and Interest Rate Model Optimization in DeFi Lending
ABSTRACT Contrasting sharply with traditional money, bond, and bond futures markets, where interest rates emerge organically from participant interactions, DeFi lending platforms employ rule‐based interest rates that are algorithmically set. Thus, the selection of an effective interest rate model (IRM) is paramount for the success of a lending protocol.
Charles Bertucci +4 more
wiley +1 more source
ABSTRACT Pulses offer significant nutritional and environmental benefits and are useful components of healthier, more sustainable diets and global food security. However, their consumption in France remains low and below the world average. Farmers face economic and technical challenges in diversifying crops, and current domestic production is ...
Gaëlle Arvisenet +7 more
wiley +1 more source
Abstract INTRODUCTION This paper presents the development of a framework to assess the use and experiences of non‐pharmacological interventions (NPIs) supporting sleep, including technological and indoor environmental quality (IEQ) measures. Sleep disturbances are common in people with dementia (PwD) and increase caregiver burden.
CAM Huisman, MGLC Loomans, HSM Kort
wiley +1 more source

