Results 71 to 80 of about 3,148 (188)
Electronic health records (EHRs) have become a crucial application in cloud computing environments, necessitating advanced privacy‐preserving access control mechanisms. Ciphertext policy attribute‐based encryption (CP‐ABE) is a widely recognized solution for secure access control in outsourced data environments.
Khanadech Worapaluk +2 more
wiley +1 more source
An Efficient Public Key Searchable Encryption Scheme for Mobile Smart Terminal
With the wide application of the mobile smart terminals, the data privacy protection of the mobile smart terminals stored in the cloud is more and more important.
Ningbin Yang, Shumei Xu, Zhou Quan
doaj +1 more source
Open‐source libraries are indispensable for modern software development but can create substantial maintenance burdens when they become deprecated or unmaintained. Selecting an appropriate replacement among many candidates remains challenging, since methods relying only on historical mining or similarity metrics often miss subtle differences in meaning.
Jie Luo +3 more
wiley +1 more source
SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search
Searchable encryption is a novel cryptographic primitive that enables a data storage server to retrieve the data ciphertexts without the knowledge of either what is searched for or the contents of the searched data ciphertexts.
Yang Lu, Jiguo Li, Yichen Zhang
doaj +1 more source
ABSTRACT Background Epilepsy can have a negative impact on cognitive and social functioning. Eslicarbazepine acetate (ESL) is used to treat focal seizures, although its safety and efficacy, particularly as an additional treatment, warrant more study.
Neha Bhagwan Das +9 more
wiley +1 more source
The presence of interstellar complex organic molecules (COMs) has been baffling astrochemists for a long time. Methyl formate and glycolaldehyde are widely detected but their abundances mismatch kinetic astrochemical model predictions. Here, the formation of these two COMs is characterized onto a mixed ice surface, highlighting the importance of ...
Jessica Perrero +3 more
wiley +1 more source
A Searchable Encryption Scheme Based on CRYSTALS-Dilithium
With the advancement in quantum computing technology, the number theory-based hard problems underlying traditional searchable encryption algorithms are now vulnerable to efficient quantum attacks.
Minghui Zheng +3 more
doaj +1 more source
AAPM WGTEACH Report 366: Best practices in the teaching and mentoring of medical physics
Abstract Working Group on Teaching Educators and Clinicians How (WGTEACH) has been charged with writing a report to review best, evidence‐based practices in various aspects of the teaching of medical physics. These aspects include not only didactic teaching and mentoring in the classroom and clinic, but also teaching K‐12 and undergraduate students and
Victor J. Montemayor +13 more
wiley +1 more source
Verifiable Multi-Authority Attribute-Based Encryption with Keyword Search Based on MLWE
Searchable Encryption (SE) schemes enable data users to securely search over outsourced encrypted data stored in the cloud. To support fine-grained access control, Attribute-Based Encryption with Keyword Search (ABKS) extends SE by associating access ...
Saba Karimani, Taraneh Eghlidos
doaj +1 more source
Heavy‐element damage seeding in proteins under XFEL illumination
Plasma simulations with detailed modeling of unbound electron dynamics predict that heavy elements contribute significantly to radiation damage suffered by proteins in serial femtosecond crystallography. New methods to mitigate radiation damage in this regime are highlighted.Serial femtosecond X‐ray crystallography (SFX) captures the structure and ...
Spencer K. Passmore +3 more
wiley +1 more source

