Results 61 to 70 of about 3,148 (188)
A Secure Key-Aggregate Keyword Retrieval Scheme Over Encrypted Data in Cloud Computing
Key-aggregate keyword retrieval primitive enables a cloud server on behalf of delegated users to securely perform a keyword search over the data encrypted with various public keys.
Chunwei Lou +6 more
doaj +1 more source
The Effectiveness of Interventions Addressing Conspiracy Beliefs: A Meta‐Analysis
ABSTRACT Reducing conspiracy beliefs through effective interventions may help mitigate potential harmful consequences, such as vaccine hesitancy and prejudice. Therefore, a systematic literature search was conducted in Web of Science, PsycINFO, and Google Scholar for experiments testing interventions that could potentially reduce conspiracy beliefs ...
Lukasz Stasielowicz
wiley +1 more source
Public-Key Encryption With Keyword Search via Obfuscation
Public-key encryption with keyword search (PEKS) enables users to search on encrypted data, which is applicable to the scenario of sharing data in the cloud storage. In this paper, we focus on how to construct a PEKS scheme via obfuscation.
Chengyu Hu +3 more
doaj +1 more source
Abstract Tropical forests play a vital role in the global carbon cycle and land–atmosphere interactions. Estimating tropical forest carbon–water dynamics is challenging due to observational and modeling uncertainties. This study leverages the “Trends and drivers of the regional scale terrestrial sources and sinks of carbon dioxide” (TRENDY) project ...
Mingjie Shi +7 more
wiley +1 more source
ABSTRACT Issue Performance and image‐enhancing drug (PIED) use among women is a growing phenomenon, particularly within weight‐training populations. Despite increasing prevalence, research on the psychosocial factors involved in women's PIED use remains emergent and fragmented.
Hannah C. Schuurs +3 more
wiley +1 more source
Certificate-Based Encryption with Keyword Search: Enabling Secure Authorization in Electronic Health Record [PDF]
In an e-Health scenario, we study how the practitioners are authorized when they are requesting access to medical documents containing sensitive information. Consider the following scenario. A clinician wants to access and retrieve a patient’s Electronic
Clémentine Gritti +2 more
doaj
Still Wrong Use of Pairings in Cryptography [PDF]
Several pairing-based cryptographic protocols are recently proposed with a wide variety of new novel applications including the ones in emerging technologies like cloud computing, internet of things (IoT), e-health systems and wearable technologies ...
Kiraz, Mehmet Sabir, Uzunkol, Osmanbey
core +1 more source
Abstract Background Ethics and diversity, equity, and inclusion (DEI) are critical aspects of engineering, and connections between ethics/DEI are becoming increasingly common place in engineering education and practice. For example, many engineering professional organizations have integrated DEI into their codes of ethics.
Justin L. Hess +2 more
wiley +1 more source
Identifying a Game Console Vulnerability and Potential Exploitation for eBusiness Attacks [PDF]
Game Information System (IS) consoles are used by millions of players at any one time to access the Internet and information resources. In this research we questioned the security of these systems and evaluated one identified vulnerability for the ...
Cusack, Brian, Robinson, Nick
core
This paper proposes a novel lightweight certificateless public key authentication with keyword search (CPAEKS) scheme tailored for IIoT environments, effectively addressing data confidentiality and retrieval efficiency. The scheme resists frequency analysis attacks, removes reliance on bilinear pairings, and eliminates key escrow and certificate ...
Kaiqi Liu +3 more
wiley +1 more source

