Results 61 to 70 of about 19,326 (124)

Christian Bohr. Discoverer of Homotropic and Heterotopic Allostery

open access: yesActa Physiologica, Volume 241, Issue S734, July 2025.
ABSTRACT This essay recounts and revisits the scientific contributions of Christian Bohr, highlighting his pivotal role in discovering allostery about 120 years ago. Bohr's meticulous experimentation led to identifying two distinct forms of allostery: homotropic (single‐ligand) and heterotropic (multi‐ligand), the latter widely recognized as the Bohr ...
Niels Bindslev
wiley   +1 more source

Searchable public key encryption with designated verifier secure against the server

open access: yesTongxin xuebao, 2014
In designated verifier searchable public key encryption (dPEKS) schemes,the IND-KGA-SERVER security was proposed to formalize the security against the server.Based on the IND-KGA secure dPEKS,the CA (certificate authority),and the strongly unforgeable ...
Zhi-yi SHAO   +3 more
doaj   +2 more sources

Blockchain-based user-friendly data retrieval and sharing scheme in cloud-assisted industrial Internet of things

open access: yesTongxin xuebao
To address the challenges of secure data retrieval and sharing in the industrial Internet of things (IIoT), as well as the vulnerability to offline keyword guessing attacks when using public-key encrypted indexes, a blockchain-based user-friendly data ...
ZHANG Bo, LI Zhecheng, XU Xingshuai
doaj  

Exposure Resilient Public-key Encryption with Keyword Search against Keyword Guessing Attack

open access: yesProceedings of the 18th International Conference on Security and Cryptography, 2021
Satoshi Obana, Kaito Uemura
openaire   +1 more source

An improved secure designated server certificateless authenticated searchable encryption scheme for IIoT

open access: yesHigh-Confidence Computing
The Industrial Internet of Things (IIoT) achieves the automation, monitoring, and optimization of industrial processes by interconnecting various sensors, smart devices, and the Internet, which dramatically increases productivity and product quality ...
Le Zhang   +4 more
doaj   +1 more source

An Efficient Lattice-Based Verifiable Public-Key Authenticated Encryption With Keyword Search Scheme

open access: yesIEEE Access
Searchable encryption enables efficient retrieval of encrypted data stored in cloud environments while preserving data confidentiality. Within this context, Public Key Encryption with Keyword Search (PEKS) allows data users to perform keyword-based ...
Saba Karimani, Taraneh Eghlidos
doaj   +1 more source

Blockchain-Assisted Verifiable and Multi-User Fuzzy Search Encryption Scheme

open access: yesApplied Sciences
Searchable encryption (SE) allows users to efficiently retrieve data from encrypted cloud data, but most of the existing SE solutions only support precise keyword search.
Xixi Yan   +3 more
doaj   +1 more source

Enhancing Security and Efficiency: A Fine-Grained Searchable Scheme for Encryption of Big Data in Cloud-Based Smart Grids

open access: yesMathematics
The smart grid, as a crucial part of modern energy systems, handles extensive and diverse data, including inputs from various sensors, metering devices, and user interactions.
Jing Wen   +3 more
doaj   +1 more source

Hierarchical Identity-Based Authenticated Encryption with Keyword Search over encrypted cloud data

open access: yesJournal of Cloud Computing: Advances, Systems and Applications
With the rapid development of cloud computing technology, cloud storage services are becoming more and more mature. However, the storage of sensitive data on remote servers poses privacy risks and is presently a source of concern.
Danial Shiraly   +2 more
doaj   +1 more source

Blockchain-Enabled Searchable Encryption for Secure and Efficient Sharing of IoHT-Generated Electronic Medical Records in Cloud-Based Healthcare [PDF]

open access: yesRadioengineering
Protecting the security of data generated by wearables and monitoring devices is critical in smart wards, especially when healthcare schemes use cloud storage services to save patients' Electronic Medical Records (EMRs). These devices operate in wireless
S. Rajesh Kumar   +2 more
doaj  

Home - About - Disclaimer - Privacy