Results 51 to 60 of about 19,760 (270)

Shared and searchable encrypted data for untrusted servers [PDF]

open access: yes, 2011
Current security mechanisms are not suitable for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client side is the normal approach in this situation but has high communication and ...
Dong, Changyu   +2 more
core   +1 more source

Multi‐State Probabilistic Computing Using Floating‐Body MOSFETs Based on the Potts Model for Solving Complex Combinatorial Optimization Problems

open access: yesAdvanced Materials, EarlyView.
This work introduces a multi‐state probabilistic computing system based on Potts‐model p‐bits using stochastic switching floating body metal oxide semiconductor field effect transistors (FB‐MOSFETs). By employing drain‐voltage sharing and one‐hot sampling, the system achieves controllable probabilistic behavior.
Sunwoo Cheong   +9 more
wiley   +1 more source

Security Analysis and Performance Evaluation of Certificateless Proxy Re-Encryption for Blockchain Applications

open access: yesIEEE Access
Certificateless Proxy Re-Encryption (CL-PRE) eliminates certificate management and private key exposure risks for blockchain data sharing, but existing schemes have critical security vulnerabilities and performance limitations.
S. Remya   +4 more
doaj   +1 more source

Navigating Ternary Doping in Li‐ion Cathodes With Closed‐Loop Multi‐Objective Bayesian Optimization

open access: yesAdvanced Materials, EarlyView.
The search for advanced battery materials is pushing us into highly complex composition spaces. Here, a space with about 14 million unique combinations is efficiently explored using high‐throughput experimentation guided by Bayesian optimization with a deep kernel trained on both the Materials Project database and our data.
Nooshin Zeinali Galabi   +6 more
wiley   +1 more source

Generative Models for Crystalline Materials

open access: yesAdvanced Materials, EarlyView.
Generative machine learning models are increasingly used in crystalline materials design. This review outlines major generative approaches and assesses their strengths and limitations. It also examines how generative models can be adapted to practical applications, discusses key experimental considerations for evaluating generated structures, and ...
Houssam Metni   +15 more
wiley   +1 more source

A Fine-Grained and Lightweight Data Access Control Model for Mobile Cloud Computing

open access: yesIEEE Access, 2021
With rapidly increasing adoption of cloud computing and the advancement of today mobile computing, it is inevitable that mobile devices are used to receive and send the data through the mobile cloud platform.
Somchart Fugkeaw
doaj   +1 more source

Information Transmission Strategies for Self‐Organized Robotic Aggregation

open access: yesAdvanced Robotics Research, EarlyView.
In this review, we discuss how information transmission influences the neighbor‐based self‐organized aggregation of swarm robots. We focus specifically on local interactions regarding information transfer and categorize previous studies based on the functions of the information exchanged.
Shu Leng   +5 more
wiley   +1 more source

Obfuscating Re-encryption Algorithm With Flexible and Controllable Multi-Hop on Untrusted Outsourcing Server

open access: yesIEEE Access, 2017
An outsourcing re-encryption program can help a ciphertext owner (delegator) transform his/her ciphertext into another ciphertext of delegatee. For example, an e-mail receiver can re-transfer an encrypted e-mail to his secretary while allowing the e-mail
Mingwu Zhang   +3 more
doaj   +1 more source

Highly Resolved Community Sewage Metagenomics Unveiling Landscape and Transmission Patterns of Antibiotic Resistome in Hong Kong Populations

open access: yesAdvanced Science, EarlyView.
A large‐scale, high‐resolution antimicrobial resistance (AMR) surveillance in Hong Kong community sewage combining short‐ and long‐read sequencing. The resistome profile is comprehensively characterized, and this upstream sampling strategy demonstrated superiority in reflecting the human gut resistome.
Jiahui Ding   +11 more
wiley   +1 more source

Divergent Responses of Bacterial Communities to Permafrost Degradation and Their Associations With Carbon Across Vertical Profiles

open access: yesAdvanced Science, EarlyView.
Bacterial α‐diversity decreases, but stochasticity and community stability increase across the 15 m‐depth vertical profiles and along the degraded gradient within the active layer. The abundance and interaction of core taxa mainly control community stability in the active and permafrost layers, respectively.
Shengyun Chen   +13 more
wiley   +1 more source

Home - About - Disclaimer - Privacy