Results 151 to 160 of about 2,429,355 (361)
Privacy-Preserving Keyword Search With Access Control for Secret Sharing-Based Data Outsourcing
Searchable encryption, also known as secure search, is a technology that enables search operations on encrypted data while maintaining confidentiality.
Ahmad Akmal Aminuddin Mohd Kamal+2 more
doaj +1 more source
Practical Dynamic Searchable Encryption with Small Leakage [PDF]
Emil Stefanov+2 more
openalex +1 more source
Data is generated from finite element simulations and an encoding using a Moore domain. The data is then used to train a meta‐model to predict the soft unit's deformation state depending on its chamber shape and properties as well as the surrounding environment.
Philip Frederik Ligthart+1 more
wiley +1 more source
An Inner Product Predicate-Based Medical Data-Sharing and Privacy Protection System
Searchable encryption is widely used in electronic health record systems because it enables users to search ciphertext data without decryption. However, the existing traditional searchable encryption schemes lack fine-grained access policies with ...
Zigang Wu+4 more
doaj +1 more source
Crystal Structure Prediction of Cs–Te with Supervised Machine Learning
High‐throughput density functional theory calculations combined with machine learning models are employed to predict stable Cs– Te binary crystals. By systematically evaluating various structural descriptors and learning algorithms, the superiority of models based on atomic coordination environments is revealed.
Holger‐Dietrich Saßnick+1 more
wiley +1 more source
FreqD‐LBM simulates the oscillatory flow at the surface of a QCM‐D resonator in the presence of structured adsorbates. It derives shifts of frequency and bandwidth (equivalent to dissipation) on different overtones. Applications include rough surfaces, adsorbed rigid particles, adsorbed viscoelastic particles, spheres floating freely above the surface,
Diethelm Johannsmann+5 more
wiley +1 more source
Feature Homomorphism -- A Cryptographic Scheme For Data Verification Under Ciphertext-Only Conditions [PDF]
Privacy computing involves the extensive exchange and processing of encrypted data. For the parties involved in these interactions, how to determine the consistency of exchanged data without accessing the original data, ensuring tamper resistance, non-repudiation, quality traceability, indexing, and retrieval during the use of encrypted data, which is ...
arxiv
The ΔRMSF$\Delta {\rm RMSF}$ analysis reveals significant flexibility differences between free NS3 and the NS2B/NS3 complex, with notable deviations in specific regions. Key residues driving NS2B binding are identified, and the protonation state of catalytic serine affects oxyanion hole formation.
Jurica Novak+2 more
wiley +1 more source
Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control
Untrusted servers are servers or storage entities lacking complete trust from the data owner or users. This characterization implies that the server hosting encrypted data may not enjoy full trust from data owners or users, stemming from apprehensions ...
Salim Sabah Bulbul+5 more
doaj +1 more source
Mechanochemistry: Fundamental Principles and Applications
In this review, the physicochemical principles of mechanochemistry are first clarified. Based on this foundation, the research basis and cutting‐edge scientific achievements in four areas are introduced: solid‐state organic chemistry, polymers, interface science, and biomechanochemistry.
Liang Dong+4 more
wiley +1 more source