Results 71 to 80 of about 251,490 (326)

Discovery of an Adaptive Neuroimmune Response Driving Itch and Fast Tick Removal with Implications for Preventing Pathogen Transmission

open access: yesAdvanced Science, EarlyView.
Doehl et al. discovered an adaptive neuroimmune mechanism that induces itch in tick‐exposed guinea pigs, enabling rapid tick removal. This itch‐induced tick removal (IITR) is mediated by an adaptive cellular immune response and is independent of IgG, IgE, or TRPV1.
Johannes S. P. Doehl   +27 more
wiley   +1 more source

Efficient Single-Server Private Information Retrieval Based on LWE Encryption

open access: yesMathematics
Private Information Retrieval (PIR) is a cryptographic protocol that allows users to retrieve data from one or more databases without revealing any information about their queries. Among existing PIR protocols, single-server schemes based on the Learning
Hai Huang   +6 more
doaj   +1 more source

Smart Parking System With Privacy Preservation and Reputation Management Using Blockchain

open access: yesIEEE Access, 2020
Most of the existing smart parking systems threaten the drivers' privacy by revealing information about their visited locations. Moreover, they are centralized making them vulnerable to a single point of failure and attack, which threatens the ...
Mahmoud M. Badr   +5 more
doaj   +1 more source

Lengthening and Extending Binary Private Information Retrieval Codes

open access: yes, 2018
It was recently shown by Fazeli et al. that the storage overhead of a traditional $t$-server private information retrieval (PIR) protocol can be significantly reduced using the concept of a $t$-server PIR code.
Lin, Hsuan-Yin, Rosnes, Eirik
core   +1 more source

Efficient and secure ranked multi-keyword search on encrypted cloud data [PDF]

open access: yes, 2012
Information search and document retrieval from a remote database (e.g. cloud server) requires submitting the search terms to the database holder. However, the search terms may contain sensitive information that must be kept secret from the database ...
Orencik, Cengiz   +3 more
core   +1 more source

Changes in Alcohol Retail Laws and Foot Traffic at Liquor Stores

open access: yesApplied Economic Perspectives and Policy, EarlyView.
ABSTRACT We study how expanding alcohol availability at grocery and convenience stores affects consumer traffic in liquor stores by leveraging recent changes in state‐level alcohol distribution laws in a difference‐in‐difference quasi‐experimental design.
Nathan Palardy   +3 more
wiley   +1 more source

Private Information Retrieval From AI Chatbots via Proxy-Prompt Masking

open access: yesIEEE Access
This paper proposes a privacy-preserving scheme, PromptMasking, for querying AI chatbots without disclosing users’ sensitive prompts. This scheme enables users to query AI systems without revealing their true intent by transforming sensitive ...
Shariq Bashir
doaj   +1 more source

Price Premiums for Single‐Name and Compound‐Name Geographical Indications in Swiss Cheese Trade

open access: yesAgribusiness, EarlyView.
ABSTRACT Geographical indications (GIs) have become increasingly important in agri‐food markets, especially in Europe. For Swiss cheese imports and exports, we analyze whether GIs are associated with higher trade prices. We find that price premiums can be obtained for both exports and imports. However, this is only the case for cheeses with single name
Judith Irek
wiley   +1 more source

Single-Server Single-Message Online Private Information Retrieval with Side Information

open access: yes, 2019
In many practical settings, the user needs to retrieve information from a server in a periodic manner, over multiple rounds of communication. In this paper, we discuss the setting in which this information needs to be retrieved privately, such that the ...
Heidarzadeh, Anoosheh   +3 more
core   +1 more source

Sustainability Strategies in the Cocoa‐Chocolate Value Chain: An Analysis Using Stakeholder Theory, Global Value Chain Theory, and Resource Dependence Theory

open access: yesAgribusiness, EarlyView.
ABSTRACT The cocoa‐chocolate value chain faces significant environmental and social challenges, driving firms to adopt sustainability strategies ranging from individual practices to third‐party certifications. This study investigates the factors associated with these strategies by analyzing 304 cocoa‐chocolate companies using firm‐level data from the ...
Stella Marschner   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy