Results 101 to 110 of about 8,870 (281)
Forward Secure Conjunctive-Keyword Searchable Encryption
Searchable symmetric encryption (SSE) has been applied in constructing secure cloud storage for its simplicity, high-efficiency, and practicality. Recent works show that forward privacy has become a fundamental property required for SSE, and several ...
Chengyu Hu +6 more
doaj +1 more source
Attribute-based multi-user collaborative searchable encryption in COVID-19. [PDF]
Zhao F +5 more
europepmc +1 more source
Magnetic tunnel junctions (MTJs) using MgO tunnel barriers face challenges of high resistance‐area product and low tunnel magnetoresistance (TMR). To discover alternative materials, Literature Enhanced Ab initio Discovery (LEAD) is developed. The LEAD‐predicted materials are theoretically evaluated, showing that MTJs with dusting of ScN or TiN on ...
Sabiq Islam +6 more
wiley +1 more source
Multi-sensor network tracking research utilizing searchable encryption algorithm in the cloud computing environment. [PDF]
Sun X, Li S.
europepmc +1 more source
Residual magnetization induces pronounced mechanical anisotropy in ultra‐soft magnetorheological elastomers, shaping deformation and actuation even without external magnetic fields. This study introduces a computational‐experimental framework integrating magneto‐mechanical coupling into topology optimization for designing soft magnetic actuators with ...
Carlos Perez‐Garcia +3 more
wiley +1 more source
Two‐Photon 3D Printing of Functional Microstructures Inside Living Cells
This study demonstrates 3D printing inside living cells by using two‐photon photo‐lithography. A bio‐compatible photoresist is injected into cells and selectively polymerized with a femtosecond laser, creating custom‐shaped intracellular structures with submicron resolution.
Maruša Mur +4 more
wiley +1 more source
Encrypting data is a solution to enhance the privacy and confidentiality of the data owners when outsourcing storage to cloud storage providers. However, using conventional encryption algorithms would render search queries based on the content of the data useless.
openaire +1 more source
Secure and Scalable Multi-User Searchable Encryption
By allowing a large number of users to behave as readers or writers, Multi-User Searchable Encryption (MUSE) raises new security and performance challenges beyond the typical requirements of Symmetric Searchable Encryption (SSE). In this paper we identify two core mandatory requirements of MUSE protocols being privacy in face of users colluding with ...
Van Rompay, Cédric +2 more
openaire +3 more sources
An active learning framework, grounded in independently generated in‐house experimental data, enables reliable discovery of high‐performance interfacial materials for perovskite solar cells. Iterative model refinement autonomously converges toward structurally robust quaternary ammonium architectures, establishing a new design principle for interfacial
Jongbeom Kim +8 more
wiley +1 more source
An Industrial IoT-Based Blockchain-Enabled Secure Searchable Encryption Approach for Healthcare Systems Using Neural Network. [PDF]
Ali A +7 more
europepmc +1 more source

