Results 61 to 70 of about 4,231 (188)
Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length [PDF]
Outsourced decryption ABE system largely reduces the computation cost for users who intend to access the encrypted files stored in cloud. However, the correctness of the transformation ciphertext cannot be guaranteed because the user does not have the original ciphertext. Lai et al.
Jiguo Li +4 more
openaire +1 more source
PHOABE : securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT [PDF]
Attribute based encryption (ABE) is an encrypted access control mechanism that ensures efficient data sharing among dynamic group of users. Nevertheless, this encryption technique presents two main drawbacks, namely high decryption cost and publicly ...
Attia, R +4 more
core +5 more sources
Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values [PDF]
Two-party secure function evaluation (SFE) has become significantly more feasible, even on resource-constrained devices, because of advances in server-aided computation systems.
Butler, Kevin +3 more
core
Abstract Asset managers, private equity firms and other institutional investors have assumed an increasingly important role in the ownership and management of housing and infrastructure since the Global Financial Crisis. This article analyses how social housing in London is being transformed into a financial asset through an analysis of ‘income strip ...
Aretousa Bloom, Joe Penny
wiley +1 more source
Privacy-Preserving Genetic Relatedness Test [PDF]
An increasing number of individuals are turning to Direct-To-Consumer (DTC) genetic testing to learn about their predisposition to diseases, traits, and/or ancestry. DTC companies like 23andme and Ancestry.com have started to offer popular and affordable
De Cristofaro, Emiliano +2 more
core +1 more source
Patient‐derived head and neck squamous cell carcinoma (HNSCC) cells were genomically and cytogenetically characterized, revealing actionable alterations and chromosomal instability. Targeted therapies suppressed growth according to EGFR amplification or PIK3CA mutation status.
Kazue Ito +17 more
wiley +1 more source
Platform Bricolage as an Approach for Industrial Digital Platform‐Based Innovation
ABSTRACT This study introduces platform bricolage as an approach for industrial digital platform‐based innovation. Using a rich multiple‐case study design, it examines bricolage‐based modes of practice in the early formation of industrial digital platforms.
Nikolina Koporcic +3 more
wiley +1 more source
A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing
With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically.
Kai Fan +4 more
doaj +1 more source
Secure outsourced decryption for FHE-based privacy-preserving cloud computing
The demand for processing vast volumes of data has surged dramatically due to the advancement of machine learning technology. Large-scale data processing necessitates substantial computational resources, prompting individuals and enterprises to turn to cloud services.
Ma, Xirong +7 more
openaire +2 more sources
Abstract Although seed represents an important means of plant pathogen dispersion, the seed–pathogen dialogue remains largely unexplored. A multiomic approach was performed at different seed developmental stages of common bean (Phaseolus vulgaris L.) during asymptomatic colonization by Xanthomonas citri pv.
Armelle Darrasse +6 more
wiley +1 more source

