Results 61 to 70 of about 3,148 (188)

A Secure Key-Aggregate Keyword Retrieval Scheme Over Encrypted Data in Cloud Computing

open access: yesIEEE Access
Key-aggregate keyword retrieval primitive enables a cloud server on behalf of delegated users to securely perform a keyword search over the data encrypted with various public keys.
Chunwei Lou   +6 more
doaj   +1 more source

The Effectiveness of Interventions Addressing Conspiracy Beliefs: A Meta‐Analysis

open access: yesEuropean Journal of Social Psychology, Volume 56, Issue 1, Page 275-291, February 2026.
ABSTRACT Reducing conspiracy beliefs through effective interventions may help mitigate potential harmful consequences, such as vaccine hesitancy and prejudice. Therefore, a systematic literature search was conducted in Web of Science, PsycINFO, and Google Scholar for experiments testing interventions that could potentially reduce conspiracy beliefs ...
Lukasz Stasielowicz
wiley   +1 more source

Public-Key Encryption With Keyword Search via Obfuscation

open access: yesIEEE Access, 2019
Public-key encryption with keyword search (PEKS) enables users to search on encrypted data, which is applicable to the scenario of sharing data in the cloud storage. In this paper, we focus on how to construct a PEKS scheme via obfuscation.
Chengyu Hu   +3 more
doaj   +1 more source

Accelerated Carbon and Water Cycles in the Amazon and Congo Basins Revealed From TRENDY Models and Remote Sensing Products

open access: yesGlobal Biogeochemical Cycles, Volume 40, Issue 2, February 2026.
Abstract Tropical forests play a vital role in the global carbon cycle and land–atmosphere interactions. Estimating tropical forest carbon–water dynamics is challenging due to observational and modeling uncertainties. This study leverages the “Trends and drivers of the regional scale terrestrial sources and sinks of carbon dioxide” (TRENDY) project ...
Mingjie Shi   +7 more
wiley   +1 more source

A Systematic Review Investigating the Psychosocial Factors Influencing Initiation, Use and Subjective Experience of Performance and Image‐Enhancing Drugs in Women Who Weight‐Train

open access: yesDrug and Alcohol Review, Volume 45, Issue 2, February 2026.
ABSTRACT Issue Performance and image‐enhancing drug (PIED) use among women is a growing phenomenon, particularly within weight‐training populations. Despite increasing prevalence, research on the psychosocial factors involved in women's PIED use remains emergent and fragmented.
Hannah C. Schuurs   +3 more
wiley   +1 more source

Certificate-Based Encryption with Keyword Search: Enabling Secure Authorization in Electronic Health Record [PDF]

open access: yesJournal of Internet Services and Information Security, 2016
In an e-Health scenario, we study how the practitioners are authorized when they are requesting access to medical documents containing sensitive information. Consider the following scenario. A clinician wants to access and retrieve a patient’s Electronic
Clémentine Gritti   +2 more
doaj  

Still Wrong Use of Pairings in Cryptography [PDF]

open access: yes, 2016
Several pairing-based cryptographic protocols are recently proposed with a wide variety of new novel applications including the ones in emerging technologies like cloud computing, internet of things (IoT), e-health systems and wearable technologies ...
Kiraz, Mehmet Sabir, Uzunkol, Osmanbey
core   +1 more source

Intersections between ethics and diversity, equity, and inclusion in engineering practice: Insights from practitioners' mental models

open access: yesJournal of Engineering Education, Volume 115, Issue 1, January 2026.
Abstract Background Ethics and diversity, equity, and inclusion (DEI) are critical aspects of engineering, and connections between ethics/DEI are becoming increasingly common place in engineering education and practice. For example, many engineering professional organizations have integrated DEI into their codes of ethics.
Justin L. Hess   +2 more
wiley   +1 more source

Identifying a Game Console Vulnerability and Potential Exploitation for eBusiness Attacks [PDF]

open access: yes, 2014
Game Information System (IS) consoles are used by millions of players at any one time to access the Internet and information resources. In this research we questioned the security of these systems and evaluated one identified vulnerability for the ...
Cusack, Brian, Robinson, Nick
core  

Pairing‐Free Certificateless Searchable Public Key Encryption Scheme Resistant to Frequency Analysis for IIOT

open access: yesIET Communications, Volume 20, Issue 1, January/December 2026.
This paper proposes a novel lightweight certificateless public key authentication with keyword search (CPAEKS) scheme tailored for IIoT environments, effectively addressing data confidentiality and retrieval efficiency. The scheme resists frequency analysis attacks, removes reliance on bilinear pairings, and eliminates key escrow and certificate ...
Kaiqi Liu   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy