Results 41 to 50 of about 10,571 (279)
PENCARIAN DATA TERENKRIPSI MENGGUNAKAN SKEMA PUBLIC-KEY ENCRYPTION WITH KEYWORD SEARCH [PDF]
Bagi sebuah perusahaan data merupakan hal yang sangat penting. Suatu kebijakan atau keputusan perusahaan sering kali didasarkan pada data-data. Banyak proses yang dapat dilakukan untuk memelihara data, salahsatunya adalah menyimpannya pada clouds. Namun,
Firdaus, Alex
core
Shared and Searchable Encrypted Data for Untrusted Servers [PDF]
Current security mechanisms pose a risk for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client side is the normal approach in this situation but has high communication and ...
Dong, Changyu +2 more
core +3 more sources
An active learning framework, grounded in independently generated in‐house experimental data, enables reliable discovery of high‐performance interfacial materials for perovskite solar cells. Iterative model refinement autonomously converges toward structurally robust quaternary ammonium architectures, establishing a new design principle for interfacial
Jongbeom Kim +8 more
wiley +1 more source
Shared and searchable encrypted data for untrusted servers [PDF]
Current security mechanisms are not suitable for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client side is the normal approach in this situation but has high communication and ...
Dong, Changyu +2 more
core +1 more source
Alternating High‐Fat and Polysaccharide Diets Modulates Gut Phage‐Bacterial Interplay
This study reveals how alternating high‐fat and polysaccharide diets reshape the human gut virome and enhance phage‐bacteria interactions. Using large‐scale metagenomic meta‐analysis and a time‐resolved mouse model, the authors show that diets strongly modulate phage abundance, lifestyle, and gene exchange, offering new insights into nutrition‐guided ...
Fengxiang Zhao +6 more
wiley +1 more source
As a multireceiver variant of public key authenticated encryption with keyword search (PAEKS), broadcast authenticated encryption with keyword search (BAEKS) was proposed by Liu et al. (ACISP 2021).
Keita Emura
doaj +1 more source
Distributed Searchable Asymmetric Encryption [PDF]
Searchable asymmetric encryption (SAE) can also be called Public Key Encryption with Keyword Search (PEKS), which allows us to search the keyword on the data of having been encrypted. The essence of Asymmetric searchable encryption is that users exchange
Liu, Jie, Teng, Lin, Yin, Shoulin
core +2 more sources
Forward Secure Public-key Authenticated Encryption with Conjunctive Keyword Search
Abstract Public key encryption with keyword search is a promising primitive which enables search over encrypted data in secure data outsourcing services. In traditional construction, the associated keywords may be recovered from a given trapdoor by a malicious server through keyword guessing attacks.
Zhe Jiang +3 more
openaire +1 more source
Integration of a pancreatic eQTL map with a GWAS meta‐analysis identifies 82 putative functional variants and 15 genes. The association between rs11102484 and pancreatic cancer risk is observed in a total of 5699 cases and 8467 controls. The G allele of rs11102484 weakens ZNF263 binding and the silencer‐promoter interaction, thereby increasing ST7L ...
Xiaoyang Wang +14 more
wiley +1 more source
Fast and Parallel Keyword Search Over Public-Key Ciphertexts for Cloud-Assisted IoT
Cloud-assisted Internet of Things (IoT) is a popular system model to merge the advantages of both the cloud and IoT. In this model, IoT collects the real-world data, and the cloud maximizes the value of these data by sharing and analyzing them.
Peng Xu +4 more
doaj +1 more source

