Results 81 to 90 of about 4,231 (188)
Summary Acclimation enables plants to adjust to immediate environmental fluctuations and is therefore key to the resilience of plant disease resistance in a time of climate change. Here, we report on the acclimation of Arabidopsis thaliana quantitative immune responses against the fungal pathogen Sclerotinia sclerotiorum to daily environmental ...
Marie Didelon +6 more
wiley +1 more source
Multi-user multi-keyword ranked search scheme in arbitrary language is a novel multi-keyword rank searchable encryption (MRSE) framework based on Paillier Cryptosystem with Threshold Decryption (PCTD).
Abedin, Zain Ul +5 more
core +1 more source
Smart meter (SM): Collect the data of users' electricity consumption periodically, and preprocess the noise reduction by using the Robust Local Weighted Regression algorithm, then encrypt the private data in it by Boneh‐Goh‐Nissim homomorphic encryption, and submit the encrypted private data to the fog node.
Jiangtao Guo +5 more
wiley +1 more source
Attribute-based bilateral access control scheme for cloud storage
In the existing cloud storage systems, the fine grained and bilateral access control schemes suffer from weak security model and unverifiable outsourced decryption result.
LI Qi +5 more
doaj +2 more sources
Outsourced ciphertext-policy attribute-based encryption with partial policy hidden
Attribute-based encryption is an efficient and flexible fine-grained access control scheme. However, how to realize the attribute privacy concerns in the access policy and optimize the heavy computing overhead have been not adequately addressed.
Jinxia Yu +4 more
doaj +1 more source
The transparency trap: Generative AI and the rise of interpretive load
Abstract This commentary interrogates the renewed centrality of ‘transparency’ in higher education's response to generative artificial intelligence (AI) and introduces interpretive load as a necessary extension to existing assessment theory. While transparency is conventionally framed as a vehicle for fairness and clarity, research demonstrates that ...
Chahna Gonsalves
wiley +1 more source
Multi-authority Attribute-Based Encryption with User Revocation and Outsourcing Decryption
Abstract Attribute based encryption scheme is widely used to share sensitive data in cloud storage environment because it can realize fine-grained access control. Aiming at the problem of user revocation and high cost of decryption in cloud storage environment, a multi-authority attribute based encryption scheme with efficient user ...
Xinyue Zhang +3 more
openaire +1 more source
ABSTRACT This article pursues two objectives. First, it aims to trace the genealogy of data protection regulation in major liberal democracies. To do so, it examines the evolution of this regulation in the United States, France, and Germany, among others, and relies on the policy actors' triangle framework.
Nicolas Bocquet
wiley +1 more source
Optimal QoS Constraint Service Composition in Mobile Ad Hoc Networks
In recent year's computational capability of the mobile nodes have been greatly improved. The mobile nodes have the capability of running different applications.
Belgaum, Mohammad Riyaz +2 more
core +1 more source
This study presents a dual‐layered anonymization model combining BioClinicalBERT and polyalphabetic cipher to accurately identify and protect sensitive healthcare data. It achieves strong F1 scores while maintaining data utility, enabling privacy‐preserving clinical research compliant with GDPR and HIPAA regulations.
Deblina Mazumder Setu +3 more
wiley +1 more source

