Results 61 to 70 of about 19,326 (124)
Christian Bohr. Discoverer of Homotropic and Heterotopic Allostery
ABSTRACT This essay recounts and revisits the scientific contributions of Christian Bohr, highlighting his pivotal role in discovering allostery about 120 years ago. Bohr's meticulous experimentation led to identifying two distinct forms of allostery: homotropic (single‐ligand) and heterotropic (multi‐ligand), the latter widely recognized as the Bohr ...
Niels Bindslev
wiley +1 more source
Searchable public key encryption with designated verifier secure against the server
In designated verifier searchable public key encryption (dPEKS) schemes,the IND-KGA-SERVER security was proposed to formalize the security against the server.Based on the IND-KGA secure dPEKS,the CA (certificate authority),and the strongly unforgeable ...
Zhi-yi SHAO +3 more
doaj +2 more sources
To address the challenges of secure data retrieval and sharing in the industrial Internet of things (IIoT), as well as the vulnerability to offline keyword guessing attacks when using public-key encrypted indexes, a blockchain-based user-friendly data ...
ZHANG Bo, LI Zhecheng, XU Xingshuai
doaj
Exposure Resilient Public-key Encryption with Keyword Search against Keyword Guessing Attack
Satoshi Obana, Kaito Uemura
openaire +1 more source
The Industrial Internet of Things (IIoT) achieves the automation, monitoring, and optimization of industrial processes by interconnecting various sensors, smart devices, and the Internet, which dramatically increases productivity and product quality ...
Le Zhang +4 more
doaj +1 more source
An Efficient Lattice-Based Verifiable Public-Key Authenticated Encryption With Keyword Search Scheme
Searchable encryption enables efficient retrieval of encrypted data stored in cloud environments while preserving data confidentiality. Within this context, Public Key Encryption with Keyword Search (PEKS) allows data users to perform keyword-based ...
Saba Karimani, Taraneh Eghlidos
doaj +1 more source
Blockchain-Assisted Verifiable and Multi-User Fuzzy Search Encryption Scheme
Searchable encryption (SE) allows users to efficiently retrieve data from encrypted cloud data, but most of the existing SE solutions only support precise keyword search.
Xixi Yan +3 more
doaj +1 more source
The smart grid, as a crucial part of modern energy systems, handles extensive and diverse data, including inputs from various sensors, metering devices, and user interactions.
Jing Wen +3 more
doaj +1 more source
Hierarchical Identity-Based Authenticated Encryption with Keyword Search over encrypted cloud data
With the rapid development of cloud computing technology, cloud storage services are becoming more and more mature. However, the storage of sensitive data on remote servers poses privacy risks and is presently a source of concern.
Danial Shiraly +2 more
doaj +1 more source
Blockchain-Enabled Searchable Encryption for Secure and Efficient Sharing of IoHT-Generated Electronic Medical Records in Cloud-Based Healthcare [PDF]
Protecting the security of data generated by wearables and monitoring devices is critical in smart wards, especially when healthcare schemes use cloud storage services to save patients' Electronic Medical Records (EMRs). These devices operate in wireless
S. Rajesh Kumar +2 more
doaj

