Results 81 to 90 of about 4,231 (188)

Arabidopsis acclimation to daily environmental fluctuations converts a defense response regulator into a susceptibility factor toward Sclerotinia

open access: yesNew Phytologist, Volume 250, Issue 4, Page 2516-2534, May 2026.
Summary Acclimation enables plants to adjust to immediate environmental fluctuations and is therefore key to the resilience of plant disease resistance in a time of climate change. Here, we report on the acclimation of Arabidopsis thaliana quantitative immune responses against the fungal pathogen Sclerotinia sclerotiorum to daily environmental ...
Marie Didelon   +6 more
wiley   +1 more source

Achieving Secure and Efficient Cloud Search Services: Cross-Lingual Multi-Keyword Rank Search over Encrypted Cloud Data

open access: yes, 2019
Multi-user multi-keyword ranked search scheme in arbitrary language is a novel multi-keyword rank searchable encryption (MRSE) framework based on Paillier Cryptosystem with Threshold Decryption (PCTD).
Abedin, Zain Ul   +5 more
core   +1 more source

Data Clustering Method for Fault‐Tolerant Privacy Protection of Smart Grid Based on BGN Homomorphic Encryption Algorithm

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
Smart meter (SM): Collect the data of users' electricity consumption periodically, and preprocess the noise reduction by using the Robust Local Weighted Regression algorithm, then encrypt the private data in it by Boneh‐Goh‐Nissim homomorphic encryption, and submit the encrypted private data to the fog node.
Jiangtao Guo   +5 more
wiley   +1 more source

Attribute-based bilateral access control scheme for cloud storage

open access: yesTongxin xuebao
In the existing cloud storage systems, the fine grained and bilateral access control schemes suffer from weak security model and unverifiable outsourced decryption result.
LI Qi   +5 more
doaj   +2 more sources

Outsourced ciphertext-policy attribute-based encryption with partial policy hidden

open access: yesInternational Journal of Distributed Sensor Networks, 2020
Attribute-based encryption is an efficient and flexible fine-grained access control scheme. However, how to realize the attribute privacy concerns in the access policy and optimize the heavy computing overhead have been not adequately addressed.
Jinxia Yu   +4 more
doaj   +1 more source

The transparency trap: Generative AI and the rise of interpretive load

open access: yesReview of Education, Volume 14, Issue 1, April 2026.
Abstract This commentary interrogates the renewed centrality of ‘transparency’ in higher education's response to generative artificial intelligence (AI) and introduces interpretive load as a necessary extension to existing assessment theory. While transparency is conventionally framed as a vehicle for fairness and clarity, research demonstrates that ...
Chahna Gonsalves
wiley   +1 more source

Multi-authority Attribute-Based Encryption with User Revocation and Outsourcing Decryption

open access: yesJournal of Physics: Conference Series, 2019
Abstract Attribute based encryption scheme is widely used to share sensitive data in cloud storage environment because it can realize fine-grained access control. Aiming at the problem of user revocation and high cost of decryption in cloud storage environment, a multi-authority attribute based encryption scheme with efficient user ...
Xinyue Zhang   +3 more
openaire   +1 more source

Caught Between Privacy and Surveillance: Explaining the Long‐Term Stagnation of Data Protection Regulation in Liberal Democracies

open access: yesRegulation &Governance, Volume 20, Issue 2, Page 652-667, April 2026.
ABSTRACT This article pursues two objectives. First, it aims to trace the genealogy of data protection regulation in major liberal democracies. To do so, it examines the evolution of this regulation in the United States, France, and Germany, among others, and relies on the policy actors' triangle framework.
Nicolas Bocquet
wiley   +1 more source

Optimal QoS Constraint Service Composition in Mobile Ad Hoc Networks

open access: yes, 2017
In recent year's computational capability of the mobile nodes have been greatly improved. The mobile nodes have the capability of running different applications.
Belgaum, Mohammad Riyaz   +2 more
core   +1 more source

Towards Enhancing Healthcare Data Privacy: Integrating BioClinicalBERT With Polyalphabetic Cipher for Entity Recognition and Anonymization

open access: yesEngineering Reports, Volume 8, Issue 3, March 2026.
This study presents a dual‐layered anonymization model combining BioClinicalBERT and polyalphabetic cipher to accurately identify and protect sensitive healthcare data. It achieves strong F1 scores while maintaining data utility, enabling privacy‐preserving clinical research compliant with GDPR and HIPAA regulations.
Deblina Mazumder Setu   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy