Results 21 to 30 of about 120,111 (165)

Data Outsourcing and Sharing Scheme Based on Vector Commitment and Proxy Re-encryption [PDF]

open access: yesJisuanji gongcheng, 2018
In order to guarantee the integrity,confidentiality and accessibility of outsourcing data,a secure data outsourcing and sharing scheme is proposed based on the vector commitment primitive and the proxy re-encryption technology.By introducing a digital ...
WU Xinghua,ZHANG Aixin,LI Jianhua
doaj   +1 more source

Seismic sensitivity to sub-surface solar activity from 18 years of GOLF/SoHO observations [PDF]

open access: yes, 2015
Solar activity has significantly changed over the last two Schwabe cycles. After a long and deep minimum at the end of Cycle 23, the weaker activity of Cycle 24 contrasts with the previous cycles.
Garcia, R. A.   +2 more
core   +3 more sources

Marine plastic debris emits a keystone infochemical for olfactory foraging seabirds. [PDF]

open access: yes, 2016
Plastic debris is ingested by hundreds of species of organisms, from zooplankton to baleen whales, but how such a diversity of consumers can mistake plastic for their natural prey is largely unknown.
Ebeler, Susan E   +3 more
core   +2 more sources

Local and remote forcing on the interannual variations of the sedimentary δ15N in Santa Barbara Basin during the past 80 years

open access: yesFrontiers in Marine Science, 2022
Sedimentary nitrogen isotope (δ15Nsed) in Santa Barbara Basin (SBB) has been mostly interpreted as the record of the eastern tropical North Pacific (ETNP) intermediate water denitrification process.
Hanyue Xu   +11 more
doaj   +1 more source

The New Method of Sensor Data Privacy Protection for IoT

open access: yesShock and Vibration, 2021
This article introduces the new method of sensor data privacy protection method for IoT. Asymmetric encryption is used to verify the identity of the gateway by the sensor. The IoT gateway node verifies the integrity and source of the data, then creates a
Yue Wu, Liangtu Song, Lei Liu
doaj   +1 more source

Spin down of the core rotation in red giants [PDF]

open access: yes, 2012
The space mission Kepler provides us with long and uninterrupted photometric time series of red giants. We are now able to probe the rotational behaviour in their deep interiors using the observations of mixed modes.
Barban, C.   +20 more
core   +7 more sources

Encrypted Shared Data Spaces [PDF]

open access: yes, 2008
The deployment of Share Data Spaces in open, possibly hostile, environments arises the need of protecting the confidentiality of the data space content.
A. Wood   +13 more
core   +2 more sources

Validating a Web Service Security Abstraction by Typing [PDF]

open access: yes, 2004
An XML web service is, to a first approximation, an RPC service in which requests and responses are encoded in XML as SOAP envelopes, and transported over HTTP.
Gordon, Andrew D., Pucella, Riccardo
core   +2 more sources

The bivalve Glycymeris planicostalis as a high-resolution paleoclimate archive for the Rupelian (Early Oligocene) of central Europe [PDF]

open access: yesClimate of the Past, 2015
Current global warming is likely to result in a unipolar glaciated world with unpredictable repercussions on atmospheric and oceanic circulation patterns.
E. O. Walliser   +5 more
doaj   +1 more source

Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database

open access: yes, 2013
With the increasing importance of the internet in our day to day life, data security in web application has become very crucial. Ever increasing on line and real time transaction services have led to manifold rise in the problems associated with the ...
Chougule, Archana   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy