Results 101 to 110 of about 10,571 (279)
ABSTRACT Neisseria gonorrhoeae poses an urgent public health challenge due to rapidly increasing antimicrobial resistance and the absence of an effective vaccine. Targeting conserved bacterial pathways involved in essential physiological processes may provide new opportunities for vaccine antigen discovery.
Sinethemba H. Yakobi +1 more
wiley +1 more source
Lattice-Based Searchable Encryption With Keywords Revocable and Bounded Trapdoor Exposure Resistance
Searchable encryption plays a vital role in keeping data privacy of current cloud storage. Considering the security threat of trapdoor exposure, Emura et al. introduced a formal definition of keywords revocable public-key encryption with keywords search (
Xiaoling Yu, Chungen Xu, Lei Xu
doaj +1 more source
Dual Server Public Key Authenticated Encryption with Keyword Search
Journal on Dual server public key authenticated encryption with keyword ...
openaire +1 more source
RETRACTED: Learner emotions and performance in hypercasual VR games with adaptive AI difficulty
Abstract Hypercasual virtual reality games (HVRGs) are widely regarded as cost‐effective tools for rapid skill acquisition, yet the mechanisms that optimise their effectiveness and user acceptance remain insufficiently explored. This mixed‐methods empirical study investigates how playful emotions, characterised by engagement, enjoyment and anxiety ...
Zeeshan Ahmed, Faizan Ahmad, Chen Hui
wiley +1 more source
Hierarchical Identity-Based Authenticated Encryption with Keyword Search over encrypted cloud data
With the rapid development of cloud computing technology, cloud storage services are becoming more and more mature. However, the storage of sensitive data on remote servers poses privacy risks and is presently a source of concern.
Danial Shiraly +2 more
doaj +1 more source
Public-Key Authenticated Encryption with Keyword Search Made Easy
Public-key searchable encryption allows keyword-associated tokens to be used to test if a ciphertext contains specific keywords. Due to the low entropies of keywords, the token holder can create ciphertexts from candidate keywords and test them using the token in hand to recover the keywords, known as inside keyword guessing attacks (IKGA). Public-
Qinyi Li, Xavier Boyen
openaire +2 more sources
Abstract Academic misconduct appeal services have quietly emerged within China's education marketplace, with commercial agencies promoting themselves on social media to assist international students facing misconduct hearings. While existing research on academic integrity has emphasized prevention and detection, far less attention has been paid to what
Gengyan Tang +2 more
wiley +1 more source
ABSTRACT Sustainability reports (SRs) are widely criticized for vague disclosures and selective emphasis on positive outcomes, yet systematic research on two core SR challenges remains limited: materiality (whether disclosed content is relevant) and balance (whether both achievements and challenges are reported).
Mahsa Mohammadrezaei +1 more
wiley +1 more source
Bridging Academic Research and Business Practices at the Crossroad of Circular Economy and the SDGs
ABSTRACT The global shift toward sustainability has amplified interest in the Circular Economy, which aims to optimize resource use and minimize waste. In parallel, the Sustainable Development Goals (SDGs) provide a universal framework for addressing social, environmental, and economic challenges.
Corentin Juin, Andrea Nicolodi
wiley +1 more source
EFFICIENT PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCH [PDF]
B. MORGAN, M. HAMADA, G. ABDEFADEL
openaire +1 more source

