Results 51 to 60 of about 19,760 (270)
Shared and searchable encrypted data for untrusted servers [PDF]
Current security mechanisms are not suitable for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client side is the normal approach in this situation but has high communication and ...
Dong, Changyu +2 more
core +1 more source
This work introduces a multi‐state probabilistic computing system based on Potts‐model p‐bits using stochastic switching floating body metal oxide semiconductor field effect transistors (FB‐MOSFETs). By employing drain‐voltage sharing and one‐hot sampling, the system achieves controllable probabilistic behavior.
Sunwoo Cheong +9 more
wiley +1 more source
Certificateless Proxy Re-Encryption (CL-PRE) eliminates certificate management and private key exposure risks for blockchain data sharing, but existing schemes have critical security vulnerabilities and performance limitations.
S. Remya +4 more
doaj +1 more source
Navigating Ternary Doping in Li‐ion Cathodes With Closed‐Loop Multi‐Objective Bayesian Optimization
The search for advanced battery materials is pushing us into highly complex composition spaces. Here, a space with about 14 million unique combinations is efficiently explored using high‐throughput experimentation guided by Bayesian optimization with a deep kernel trained on both the Materials Project database and our data.
Nooshin Zeinali Galabi +6 more
wiley +1 more source
Generative Models for Crystalline Materials
Generative machine learning models are increasingly used in crystalline materials design. This review outlines major generative approaches and assesses their strengths and limitations. It also examines how generative models can be adapted to practical applications, discusses key experimental considerations for evaluating generated structures, and ...
Houssam Metni +15 more
wiley +1 more source
A Fine-Grained and Lightweight Data Access Control Model for Mobile Cloud Computing
With rapidly increasing adoption of cloud computing and the advancement of today mobile computing, it is inevitable that mobile devices are used to receive and send the data through the mobile cloud platform.
Somchart Fugkeaw
doaj +1 more source
Information Transmission Strategies for Self‐Organized Robotic Aggregation
In this review, we discuss how information transmission influences the neighbor‐based self‐organized aggregation of swarm robots. We focus specifically on local interactions regarding information transfer and categorize previous studies based on the functions of the information exchanged.
Shu Leng +5 more
wiley +1 more source
An outsourcing re-encryption program can help a ciphertext owner (delegator) transform his/her ciphertext into another ciphertext of delegatee. For example, an e-mail receiver can re-transfer an encrypted e-mail to his secretary while allowing the e-mail
Mingwu Zhang +3 more
doaj +1 more source
A large‐scale, high‐resolution antimicrobial resistance (AMR) surveillance in Hong Kong community sewage combining short‐ and long‐read sequencing. The resistome profile is comprehensively characterized, and this upstream sampling strategy demonstrated superiority in reflecting the human gut resistome.
Jiahui Ding +11 more
wiley +1 more source
Bacterial α‐diversity decreases, but stochasticity and community stability increase across the 15 m‐depth vertical profiles and along the degraded gradient within the active layer. The abundance and interaction of core taxa mainly control community stability in the active and permafrost layers, respectively.
Shengyun Chen +13 more
wiley +1 more source

