Results 1 to 10 of about 1,939 (202)
R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data [PDF]
In the recent past, few works have been done by combining attribute-based access control with multi-user PEKS, i.e., public key encryption with keyword search.
K Rajesh Rao +2 more
exaly +11 more sources
Public Key Encryption with Keyword Search in Cloud: A Survey [PDF]
With the popularization of cloud computing, many business and individuals prefer to outsource their data to cloud in encrypted form to protect data confidentiality. However, how to search over encrypted data becomes a concern for users.
Yunhong Zhou +4 more
doaj +2 more sources
A Multi-User Public Key Encryption with Multi-Keyword Search out of Bilinear Pairings [PDF]
Internet of Things (IoT) and cloud computing are adopted widely in daily life and industrial production. Sensors of IoT equipment gather personal, sensitive and important data, which is stored in a cloud server.
Shuo Zhang +4 more
doaj +2 more sources
A PEKS-Based NDN Strategy for Name Privacy
Named Data Networking (NDN), where addressable content name is used, is considered as a candidate of next-generation Internet architectures. NDN routers use In-Network cache to replicate and store passing packets to make faster content delivery.
Kyi Thar Ko, Htet Htet Hlaing
exaly +3 more sources
A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks [PDF]
Wireless sensor networks (WSN) generally utilize cloud computing to store and process sensing data in real time, namely, cloud-assisted WSN. However, the cloud-assisted WSN faces new security challenges, particularly outsourced data confidentiality. Data
Binrui Zhu +5 more
doaj +2 more sources
Preeclampsia knowledge among postpartum women treated for preeclampsia and eclampsia at Korle Bu Teaching Hospital in Accra, Ghana [PDF]
Background Preeclampsia/eclampsia is a major cause of maternal morbidity and mortality worldwide, yet patients’ perspectives about their diagnosis are not well understood.
Avina Joshi +4 more
doaj +2 more sources
Surgical management of urinary stones with abnormal kidney anatomy [PDF]
In spite of the fact that urologic surgical techniques used by urologists are becoming more and more minimally invasive and easier because of developing technologies, surgical approaches for the urinary stones in kidneys with abnormal anatomy are still ...
Giray Ergin +5 more
doaj +2 more sources
Lightweight devices in the Internet of Things (IoT) typically need to store massive data on a cloud server with strong processing and storage capabilities for later retrieval and usage.
Miao Wang, Zhenfu Cao
exaly +3 more sources
Revisit the Concept of PEKS: Problems and a Possible Solution [PDF]
Since Boneh et al. propose the concept, non-interactive\ud Public-key Encryption with Keyword Search (PEKS) has attracted lots of attention from cryptographers.
Tang, Qiang
core +17 more sources
Protein extract of kenaf seed exhibits anticoagulant, antiplatelet and antioxidant activities
Objective: To explore the anticoagulant, antiplatelet and antioxidant activities of protein extract of kenaf seed (PEKS). Methods: Sodium dodecyl sulphate polyacrylamide gel electrophoresis and reverse-phase high-performance liquid chromatography ...
Sujatha M Hanumegowda +8 more
doaj +1 more source

