Results 71 to 80 of about 10,571 (279)

Efficient Public Key Encryption with Disjunctive Keywords Search Using the New Keywords Conversion Method

open access: yesInformation, 2018
Public key encryption with disjunctive keyword search (PEDK) is a public key encryption scheme that allows disjunctive keyword search over encrypted data without decryption.
Yu Zhang, Yin Li, Yifan Wang
doaj   +1 more source

Keyword-Based Delegable Proofs of Storage

open access: yes, 2018
Cloud users (clients) with limited storage capacity at their end can outsource bulk data to the cloud storage server. A client can later access her data by downloading the required data files.
C Wang   +11 more
core   +1 more source

Large Language Model‐Based Chatbots in Higher Education

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
The use of large language models (LLMs) in higher education can facilitate personalized learning experiences, advance asynchronized learning, and support instructors, students, and researchers across diverse fields. The development of regulations and guidelines that address ethical and legal issues is essential to ensure safe and responsible adaptation
Defne Yigci   +4 more
wiley   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Stereoselective Biotransformation: Transfer of Learning to Advance Drug Metabolism and Biocatalysis

open access: yesAngewandte Chemie, EarlyView.
Understanding stereoselective biotransformations has implications for predicting drug disposition and response and may also inspire novel biocatalytic and biomimetic strategies to address challenges in metabolite and API synthesis. ABSTRACT Chirality is an important determinant of drug action, as enantiomers can exhibit markedly different ...
Grace A. Okunlola, Godwin A. Aleku
wiley   +2 more sources

GraphSE$^2$: An Encrypted Graph Database for Privacy-Preserving Social Search

open access: yes, 2019
In this paper, we propose GraphSE$^2$, an encrypted graph database for online social network services to address massive data breaches. GraphSE$^2$ preserves the functionality of social search, a key enabler for quality social network services, where ...
Beaver D.   +8 more
core   +1 more source

Integrating Artificial Intelligence With Droplet‐Based Microfluidics: Advances, Challenges, and Emerging Opportunities

open access: yesAdvanced Intelligent Systems, EarlyView.
Droplet‐based microfluidics enables precise, high‐throughput microscale reactions but continues to face challenges in scalability, reproducibility, and data complexity. This review examines how artificial intelligence enhances droplet generation, detection, sorting, and adaptive control and discusses emerging opportunities for clinical and industrial ...
Junyan Lai   +10 more
wiley   +1 more source

ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments [PDF]

open access: yes, 2013
The enforcement of security policies in outsourced environments is still an open challenge for policy-based systems. On the one hand, taking the appropriate security decision requires access to the policies.
Asghar, Muhammad Rizwan   +3 more
core   +1 more source

Retinal Vessel Segmentation: A Comprehensive Review From Classical Methods to Deep Learning Advances (1982–2025)

open access: yesAdvanced Intelligent Systems, EarlyView.
Four decades of retinal vessel segmentation research (1982–2025) are synthesized, spanning classical image processing, machine learning, and deep learning paradigms. A meta‐analysis of 428 studies establishes a unified taxonomy and highlights performance trends, generalization capabilities, and clinical relevance.
Avinash Bansal   +6 more
wiley   +1 more source

Private set intersection via public key encryption with keywords search [PDF]

open access: yesSecurity and Communication Networks, 2014
AbstractWe introduce the public key encryption with keywords search into the problem of secure two‐party computation and obtain a novel approach to accomplish private set intersection (PSI), which uses the public key encryption with keywords search as the basic tool.
Zhi‐Yi Shao, Bo Yang
openaire   +1 more source

Home - About - Disclaimer - Privacy