Results 31 to 40 of about 19,326 (124)

A Novel Methodology to Mitigate Keyword Guessing Attack using Keyword and Signature Hash

open access: yesIndian Journal of Science and Technology, 2015
The importance of electronic data and its rapid growth leads to gradual increase to the data usage over the network servers and on the other side high priority is needed for the data security and privacy. The existing keyword search schemes for data retrieval from the centralized storage uses keyword as a valid parameter.
A. Gangaa   +2 more
openaire   +1 more source

Multi-Recipient encryption with keyword search without pairing for cloud storage

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2022
With the rapid development of cloud computing technology and communication technology, cloud storage has become a tool used by people in daily life. Cloud storage service enables users to outsource data to cloud servers and retrieve desired document ...
Ningbin Yang   +3 more
doaj   +1 more source

Application of keyword searchable encryption in cloud

open access: yesTongxin xuebao, 2015
Recently,some schemes combined keyword searchable encryption with attribute based encryption,solved access control problem in cloud environment,but they didn’t consider security problems like keyword guessing attack and security channels,so they couldn’t
Peng LIN, Jie JIANG, Tie-ming CHEN
doaj   +2 more sources

Public Key Encryption with Equality Test in a Cloud Environment

open access: yesInformation, 2022
With the rapid development and wide application of cloud computing and 5G communication, the number of mobile users is increasing rapidly, meaning that cloud storage services are receiving more and more attention.
Ping Zhang, Jinbo Li, Zhumu Fu
doaj   +1 more source

Eye Movements, Item Modality, and Multimodal Second Language Vocabulary Learning: Processing and Outcomes

open access: yesLanguage Learning, EarlyView.
Abstract This study examined second language vocabulary processing and learning in reading only (RO) versus reading while listening (RWL). 119 English learners read or read‐while‐listening to a story embedded with 25 pseudowords, 10 times each, and had their eye movements tracked.
Jonathan Malone   +3 more
wiley   +1 more source

Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2023
With the rapid development of cloud computing technology, how to achieve secure access to cloud data has become a current research hotspot. Attribute-based encryption technology provides the feasibility to achieve the above goal.
Liang Yan   +5 more
doaj   +1 more source

Certificateless Searchable Encryption Scheme in Multi-User Environment

open access: yesCryptography, 2022
Searchable encryption technology enables users to access data that has been made publicly encrypted without divulging the original content. The majority of the currently available multi-user certificateless searchable encryption technologies are based on
Tao Feng, Jiewen Si
doaj   +1 more source

Agents' Behavior and Interest Rate Model Optimization in DeFi Lending

open access: yesMathematical Finance, Volume 36, Issue 2, Page 374-396, April 2026.
ABSTRACT Contrasting sharply with traditional money, bond, and bond futures markets, where interest rates emerge organically from participant interactions, DeFi lending platforms employ rule‐based interest rates that are algorithmically set. Thus, the selection of an effective interest rate model (IRM) is paramount for the success of a lending protocol.
Charles Bertucci   +4 more
wiley   +1 more source

‘PULSE FICTION’: Development of Slightly Processed Pulse‐Based Foods and Recipes to Meet the Needs of Consumers and the Agricultural Sector and Improve Food Sustainability

open access: yesNutrition Bulletin, Volume 51, Issue 1, Page 104-119, March 2026.
ABSTRACT Pulses offer significant nutritional and environmental benefits and are useful components of healthier, more sustainable diets and global food security. However, their consumption in France remains low and below the world average. Farmers face economic and technical challenges in diversifying crops, and current domestic production is ...
Gaëlle Arvisenet   +7 more
wiley   +1 more source

Developing a structured framework to explore the experiences of people with dementia and their caregivers regarding non‐pharmacological sleep interventions

open access: yesAlzheimer's &Dementia, Volume 22, Issue 2, February 2026.
Abstract INTRODUCTION This paper presents the development of a framework to assess the use and experiences of non‐pharmacological interventions (NPIs) supporting sleep, including technological and indoor environmental quality (IEQ) measures. Sleep disturbances are common in people with dementia (PwD) and increase caregiver burden.
CAM Huisman, MGLC Loomans, HSM Kort
wiley   +1 more source

Home - About - Disclaimer - Privacy