Results 71 to 80 of about 10,571 (279)
Public key encryption with disjunctive keyword search (PEDK) is a public key encryption scheme that allows disjunctive keyword search over encrypted data without decryption.
Yu Zhang, Yin Li, Yifan Wang
doaj +1 more source
Keyword-Based Delegable Proofs of Storage
Cloud users (clients) with limited storage capacity at their end can outsource bulk data to the cloud storage server. A client can later access her data by downloading the required data files.
C Wang +11 more
core +1 more source
Large Language Model‐Based Chatbots in Higher Education
The use of large language models (LLMs) in higher education can facilitate personalized learning experiences, advance asynchronized learning, and support instructors, students, and researchers across diverse fields. The development of regulations and guidelines that address ethical and legal issues is essential to ensure safe and responsible adaptation
Defne Yigci +4 more
wiley +1 more source
Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley +1 more source
Stereoselective Biotransformation: Transfer of Learning to Advance Drug Metabolism and Biocatalysis
Understanding stereoselective biotransformations has implications for predicting drug disposition and response and may also inspire novel biocatalytic and biomimetic strategies to address challenges in metabolite and API synthesis. ABSTRACT Chirality is an important determinant of drug action, as enantiomers can exhibit markedly different ...
Grace A. Okunlola, Godwin A. Aleku
wiley +2 more sources
GraphSE$^2$: An Encrypted Graph Database for Privacy-Preserving Social Search
In this paper, we propose GraphSE$^2$, an encrypted graph database for online social network services to address massive data breaches. GraphSE$^2$ preserves the functionality of social search, a key enabler for quality social network services, where ...
Beaver D. +8 more
core +1 more source
Droplet‐based microfluidics enables precise, high‐throughput microscale reactions but continues to face challenges in scalability, reproducibility, and data complexity. This review examines how artificial intelligence enhances droplet generation, detection, sorting, and adaptive control and discusses emerging opportunities for clinical and industrial ...
Junyan Lai +10 more
wiley +1 more source
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments [PDF]
The enforcement of security policies in outsourced environments is still an open challenge for policy-based systems. On the one hand, taking the appropriate security decision requires access to the policies.
Asghar, Muhammad Rizwan +3 more
core +1 more source
Four decades of retinal vessel segmentation research (1982–2025) are synthesized, spanning classical image processing, machine learning, and deep learning paradigms. A meta‐analysis of 428 studies establishes a unified taxonomy and highlights performance trends, generalization capabilities, and clinical relevance.
Avinash Bansal +6 more
wiley +1 more source
Private set intersection via public key encryption with keywords search [PDF]
AbstractWe introduce the public key encryption with keywords search into the problem of secure two‐party computation and obtain a novel approach to accomplish private set intersection (PSI), which uses the public key encryption with keywords search as the basic tool.
Zhi‐Yi Shao, Bo Yang
openaire +1 more source

