Results 41 to 50 of about 19,326 (124)
The Effectiveness of Interventions Addressing Conspiracy Beliefs: A Meta‐Analysis
ABSTRACT Reducing conspiracy beliefs through effective interventions may help mitigate potential harmful consequences, such as vaccine hesitancy and prejudice. Therefore, a systematic literature search was conducted in Web of Science, PsycINFO, and Google Scholar for experiments testing interventions that could potentially reduce conspiracy beliefs ...
Lukasz Stasielowicz
wiley +1 more source
Abstract Tropical forests play a vital role in the global carbon cycle and land–atmosphere interactions. Estimating tropical forest carbon–water dynamics is challenging due to observational and modeling uncertainties. This study leverages the “Trends and drivers of the regional scale terrestrial sources and sinks of carbon dioxide” (TRENDY) project ...
Mingjie Shi +7 more
wiley +1 more source
ABSTRACT Issue Performance and image‐enhancing drug (PIED) use among women is a growing phenomenon, particularly within weight‐training populations. Despite increasing prevalence, research on the psychosocial factors involved in women's PIED use remains emergent and fragmented.
Hannah C. Schuurs +3 more
wiley +1 more source
A certificateless and KGA-secure searchable encryption scheme with constant trapdoors in smart city
Smart cities, as a typical application in the field of the Internet of Things, can combine cloud computing to realize the intelligent control of objects and process massive data.
Hongjun Li +4 more
doaj +1 more source
Abstract Background Ethics and diversity, equity, and inclusion (DEI) are critical aspects of engineering, and connections between ethics/DEI are becoming increasingly common place in engineering education and practice. For example, many engineering professional organizations have integrated DEI into their codes of ethics.
Justin L. Hess +2 more
wiley +1 more source
Public-Key Encryption With Keyword Search via Obfuscation
Public-key encryption with keyword search (PEKS) enables users to search on encrypted data, which is applicable to the scenario of sharing data in the cloud storage. In this paper, we focus on how to construct a PEKS scheme via obfuscation.
Chengyu Hu +3 more
doaj +1 more source
Electronic health records (EHRs) have become a crucial application in cloud computing environments, necessitating advanced privacy‐preserving access control mechanisms. Ciphertext policy attribute‐based encryption (CP‐ABE) is a widely recognized solution for secure access control in outsourced data environments.
Khanadech Worapaluk +2 more
wiley +1 more source
Open‐source libraries are indispensable for modern software development but can create substantial maintenance burdens when they become deprecated or unmaintained. Selecting an appropriate replacement among many candidates remains challenging, since methods relying only on historical mining or similarity metrics often miss subtle differences in meaning.
Jie Luo +3 more
wiley +1 more source
ABSTRACT Background Epilepsy can have a negative impact on cognitive and social functioning. Eslicarbazepine acetate (ESL) is used to treat focal seizures, although its safety and efficacy, particularly as an additional treatment, warrant more study.
Neha Bhagwan Das +9 more
wiley +1 more source
Certificate-Based Encryption with Keyword Search: Enabling Secure Authorization in Electronic Health Record [PDF]
In an e-Health scenario, we study how the practitioners are authorized when they are requesting access to medical documents containing sensitive information. Consider the following scenario. A clinician wants to access and retrieve a patient’s Electronic
Clémentine Gritti +2 more
doaj

