Results 51 to 60 of about 10,571 (279)
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency [PDF]
Recently, several practical attacks raised serious concerns over the security of searchable encryption. The attacks have brought emphasis on forward privacy, which is the key concept behind solutions to the adaptive leakage-exploiting attacks, and will ...
Dong, Changyu +4 more
core +1 more source
Efficient public key encryption with revocable keyword search
ABSTRACTPublic key encryption with keyword search is a novel cryptographic primitive enabling one to search on the encrypted data directly. In the known schemes, once getting a trapdoor, the server can search associated data without any restrictions. However, in reality, it is sometimes essential to prevent the server from searching the data all the ...
Yu, Yong +4 more
openaire +2 more sources
Identifying Cytokine Motif‐Containing, Immunomodulatory Bacterial Proteins in Human Gut Microbiome
By building and constructing HMM (Upper left, blue), the authors identify CMCPs in bacteria genomes and CRC related metagenomes and enriched CRC‐related CMCPs (Upper right, blue). They analyze sequence and structural similarity of hits (Lower left, green), test function with engineered EcN delivered to tumors in a mouse tumor model (Lower right, pink ...
Ziyu Wang +12 more
wiley +1 more source
Generic Construction of Dual-Server Public Key Authenticated Encryption With Keyword Search
In this paper, we propose a generic construction of dual-server public key authenticated encryption with keyword search (DS-PAEKS) from PAEKS, public key encryption, and signatures.
Keita Emura
doaj +1 more source
Certificate-Based Encryption with Keyword Search: Enabling Secure Authorization in Electronic Health Record [PDF]
In an e-Health scenario, we study how the practitioners are authorized when they are requesting access to medical documents containing sensitive information. Consider the following scenario. A clinician wants to access and retrieve a patient’s Electronic
Clémentine Gritti +2 more
doaj
How Can We Achieve Query Keyword Frequency Analysis in Privacy-Preserving Situations?
Recently, significant progress has been made in the field of public key encryption with keyword search (PEKS), with a focus on optimizing search methods and improving the security and efficiency of schemes.
Yiming Zhu +4 more
doaj +1 more source
ALKBH3 m1A Demethylase Deficiency Reduces Alzheimer's Amyloid‐β Pathology
This study identifies that ALKBH3‐driven m1A demethylation orchestrates Alzheimer's disease progression by disrupting mitochondrial and synaptic homeostasis. This epitranscriptomic mechanism suppresses PINK1‐mediated mitophagy via m1A erasure, leading to mitochondrial dysfunction, oxidative stress, elevated Aβ production, and impaired microglial ...
Yueyang Li +25 more
wiley +1 more source
Public key encryption with keyword search (PEKS) allows a cloud server to retrieve particular ciphertexts without leaking the contents of the searched ciphertexts.
Chen Shen, Yang Lu, Jiguo Li
doaj +1 more source
A Practical Searchable Symmetric Encryption Scheme for Smart Grid Data
Outsourcing data storage to the remote cloud can be an economical solution to enhance data management in the smart grid ecosystem. To protect the privacy of data, the utility company may choose to encrypt the data before uploading them to the cloud ...
Li, Jiangnan +2 more
core +1 more source
INB3P is a multimodal framework for blood–brain barrier‐penetrating peptide prediction under extreme data scarcity and class imbalance. By combining physicochemical‐guided augmentation, sequence–structure co‐attention, and imbalance‐aware optimization, it improves predictive performance and interpretability.
Jingwei Lv +11 more
wiley +1 more source

