Results 21 to 30 of about 120,111 (165)
Data Outsourcing and Sharing Scheme Based on Vector Commitment and Proxy Re-encryption [PDF]
In order to guarantee the integrity,confidentiality and accessibility of outsourcing data,a secure data outsourcing and sharing scheme is proposed based on the vector commitment primitive and the proxy re-encryption technology.By introducing a digital ...
WU Xinghua,ZHANG Aixin,LI Jianhua
doaj +1 more source
Seismic sensitivity to sub-surface solar activity from 18 years of GOLF/SoHO observations [PDF]
Solar activity has significantly changed over the last two Schwabe cycles. After a long and deep minimum at the end of Cycle 23, the weaker activity of Cycle 24 contrasts with the previous cycles.
Garcia, R. A. +2 more
core +3 more sources
Marine plastic debris emits a keystone infochemical for olfactory foraging seabirds. [PDF]
Plastic debris is ingested by hundreds of species of organisms, from zooplankton to baleen whales, but how such a diversity of consumers can mistake plastic for their natural prey is largely unknown.
Ebeler, Susan E +3 more
core +2 more sources
Sedimentary nitrogen isotope (δ15Nsed) in Santa Barbara Basin (SBB) has been mostly interpreted as the record of the eastern tropical North Pacific (ETNP) intermediate water denitrification process.
Hanyue Xu +11 more
doaj +1 more source
The New Method of Sensor Data Privacy Protection for IoT
This article introduces the new method of sensor data privacy protection method for IoT. Asymmetric encryption is used to verify the identity of the gateway by the sensor. The IoT gateway node verifies the integrity and source of the data, then creates a
Yue Wu, Liangtu Song, Lei Liu
doaj +1 more source
Spin down of the core rotation in red giants [PDF]
The space mission Kepler provides us with long and uninterrupted photometric time series of red giants. We are now able to probe the rotational behaviour in their deep interiors using the observations of mixed modes.
Barban, C. +20 more
core +7 more sources
Encrypted Shared Data Spaces [PDF]
The deployment of Share Data Spaces in open, possibly hostile, environments arises the need of protecting the confidentiality of the data space content.
A. Wood +13 more
core +2 more sources
Validating a Web Service Security Abstraction by Typing [PDF]
An XML web service is, to a first approximation, an RPC service in which requests and responses are encoded in XML as SOAP envelopes, and transported over HTTP.
Gordon, Andrew D., Pucella, Riccardo
core +2 more sources
The bivalve Glycymeris planicostalis as a high-resolution paleoclimate archive for the Rupelian (Early Oligocene) of central Europe [PDF]
Current global warming is likely to result in a unipolar glaciated world with unpredictable repercussions on atmospheric and oceanic circulation patterns.
E. O. Walliser +5 more
doaj +1 more source
Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database
With the increasing importance of the internet in our day to day life, data security in web application has become very crucial. Ever increasing on line and real time transaction services have led to manifold rise in the problems associated with the ...
Chougule, Archana +2 more
core +1 more source

