Results 51 to 60 of about 24,134 (292)

A Certificate-Based Provable Data Possession Scheme in the Standard Model

open access: yesSecur. Commun. Networks, 2021
Certificate-based cryptosystem can not only resolve the private key escrow problem inherent in the identity-based cryptosystem but also reduce the cost of public key certificate management in the public key infrastructure-(PKI-) based cryptosystem ...
Cai-xue Zhou
semanticscholar   +1 more source

ResearchConnect: An AI‐Powered Platform for Interdisciplinary Research Team Formation and Ideation Development

open access: yesAdvanced Intelligent Systems, EarlyView.
ResearchConnect is an AI‐powered platform that automates researcher profiling, interdisciplinary team formation, and early‐stage research ideation. By extracting keywords from papers and web sources, it quickly clusters researchers into coherent teams and generates collaborative ideas using large language models. Validation on NSF‐funded projects shows
Akshay Vilas Jadhav   +2 more
wiley   +1 more source

Non-Repudiable Provable Data Possession Scheme With Designated Verifier in Cloud Storage Systems

open access: yesIEEE Access, 2017
In cloud storage systems, users can upload their data along with associated tags (authentication information) to cloud storage servers. To ensure the availability and integrity of the outsourced data, provable data possession (PDP) schemes convince ...
Tsu-Yang Wu   +3 more
doaj   +1 more source

Translating Biomedical Research to Medical Devices: A Practical Guide and the Arteriovenous Graft Case Study

open access: yesAdvanced NanoBiomed Research, EarlyView.
Despite significant advances, most academic research fails to result in medical products that benefit patients. This guide shares five key steps to help researchers close that gap: set clear goals, test thoroughly, protect ideas, build diverse teams, and partner with industry.
Cristina Oldani   +4 more
wiley   +1 more source

An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing

open access: yesIEEE Access, 2016
In cloud computing, data owners host their data on cloud servers, and users (data consumers) can access the data from the cloud servers. This new paradigm of data hosting service also introduces new security challenges that require an independent ...
Bin Feng   +5 more
doaj   +1 more source

Provable Dynamic Data Possession by Datalog Rules

open access: yesJournal of Software, 2014
In recent years, the concept of data outsourcing has become quite popular. With the appearance of Cloud Computing, there is a new paradigm: Cloud Storage. Cloud Storage means that the data owner moves its data to a Cloud Storage Server that is supposed to faithfully store the data and make it available to the data owner and perhaps the data requestors.
Jing Lu, Ting Dou
openaire   +1 more source

Noninvasive Glucose Detection with Biodegradable Electrodes from Rice Starch Functionalized with a Carbon Quantum Dot/Nickel Oxide Nanocomposite

open access: yesAnalysis &Sensing, EarlyView.
The graphical abstract shows an eco‐friendly approach to fabricating a biodegradable electrochemical sensor. Carbon quantum dot/nickel oxide (CQD/NiO) nanocomposites are synthesized using Aloe arborescens leaf extract, which served as a natural reducing and stabilizing agent.
Nokwanda Ngema   +3 more
wiley   +1 more source

Remote Dynamic Data Integrity Checking Scheme for Multi-cloud and Multi-replica [PDF]

open access: yesJisuanji kexue
More and more data owners would like to store their data to cloud servers in order to reduce their localstorage burden along with rapid development of cloud servers.However,data owners will lose the direct control over their data after uploading to cloud
TAN Shiyi, WANG Huaqun
doaj   +1 more source

Gleaning the Rocky Shore? 2500 Years of Coastal Resource Use at Red Bluff 1, GunaiKurnai Country, SE Australia

open access: yesArchaeology in Oceania, EarlyView.
ABSTRACT Shell middens in Gippsland along the eastern half of Victoria's coastline have usually been characterised as small, short‐duration camp sites with relatively low shell densities and low taxonomic diversity. Here we present new excavation results from a dense, high‐diversity site at Red Bluff near the eastern end of GunaiKurnai Country, a ...
Patrick Faulkner   +17 more
wiley   +1 more source

Distributed Machine Learning Oriented Data Integrity Verification Scheme in Cloud Computing Environment

open access: yesIEEE Access, 2020
Distributed Machine Learning (DML) is one of the core technologies for Artificial Intelligence (AI). However, in the existing distributed machine learning framework, the data integrity is not taken into account.
Xiao-Ping Zhao, Rui Jiang
doaj   +1 more source

Home - About - Disclaimer - Privacy