Results 61 to 70 of about 8,870 (281)

Multi-User Searchable Encryption Scheme for IoT Scenarios Based on Bloom Filter [PDF]

open access: yesJisuanji gongcheng
Searchable encryption technology utilizes extracted keywords as indexes to search for specific documents within a document collection. However, existing searchable encryption schemes suffer from the issues of significantly increased resource consumption ...
YI Qiuzhi, TANG Hongbo, QIU Hang
doaj   +1 more source

State of The Art and Hot Aspects in Cloud Data Storage Security [PDF]

open access: yes, 2013
Along with the evolution of cloud computing and cloud storage towards matu- rity, researchers have analyzed an increasing range of cloud computing security aspects, data security being an important topic in this area.
Gehrmann, Christian   +2 more
core   +3 more sources

POPE: Partial Order Preserving Encoding [PDF]

open access: yes, 2016
Recently there has been much interest in performing search queries over encrypted data to enable functionality while protecting sensitive data. One particularly efficient mechanism for executing such queries is order-preserving encryption/encoding (OPE ...
Apon, Daniel   +3 more
core   +2 more sources

Substring-Searchable Symmetric Encryption [PDF]

open access: yesProceedings on Privacy Enhancing Technologies, 2015
Abstract In this paper, we consider a setting where a client wants to outsource storage of a large amount of private data and then perform substring search queries on the data – given a data string s and a search string p, find all occurrences of p as a substring of s.
Melissa Chase, Emily Shen
openaire   +1 more source

Recurrent cancer‐associated ERBB4 mutations are transforming and confer resistance to targeted therapies

open access: yesMolecular Oncology, EarlyView.
We show that the majority of the 18 analyzed recurrent cancer‐associated ERBB4 mutations are transforming. The most potent mutations are activating, co‐operate with other ERBB receptors, and are sensitive to pan‐ERBB inhibitors. Activating ERBB4 mutations also promote therapy resistance in EGFR‐mutant lung cancer.
Veera K. Ojala   +15 more
wiley   +1 more source

A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data [PDF]

open access: yes, 2017
Searchable Encryption is an emerging cryptographic technique that enables searching capabilities over the encrypted data on the cloud. In this paper, a novel searchable encryption scheme for the client-server architecture has been presented.
Glackin, C.   +4 more
core   +1 more source

CCDC80 suppresses high‐grade serous ovarian cancer migration via negative regulation of B7‐H3

open access: yesMolecular Oncology, EarlyView.
PAX8 is a lineage‐specific master regulator of transcription in high‐grade serous ovarian cancer (HGSC) progression. We show for the first time that PAX8 facilitates proliferation and metastasis by repressing the cell autonomous tumor suppressor CCDC80 and inducing B7‐H3 expression.
Aya Saleh   +12 more
wiley   +1 more source

Distributed Searchable Asymmetric Encryption

open access: yesIndonesian Journal of Electrical Engineering and Computer Science, 2016
<p><em>Searchable asymmetric encryption (SAE) can also be called Public Key Encryption with Keyword Search (PEKS), which allows us to search the keyword on the data of having been encrypted. The essence of Asymmetric searchable encryption is that users exchange the data of encryption, one party sends a ciphertext with key encryption, the ...
Shoulin Yin, Lin Teng, Jie Liu
openaire   +1 more source

Differential regulation of ZFAS1 splice variants by endoplasmic reticulum stress in hepatocyte cell lines

open access: yesFEBS Open Bio, EarlyView.
ZFAS1 is a lncRNA promoting cell proliferation and migration, exhibiting high expression in various cancers. It is conserved, widely expressed, and produces multiple splice variants with unclear roles. We identified several splice variants in hepatocyte models, and found that inhibiting or suppressing regulators of the unfolded protein response (PERK ...
Sébastien Soubeyrand   +2 more
wiley   +1 more source

A Function Private Attribute-Based Encryption

open access: yesInternational Journal of Distributed Sensor Networks, 2014
The function privacy notion was proposed by Boneh, Raghunathan, and Segev in August 2013. It guarantees that the secret key reveals nothing to malicious adversary, beyond the unavoidable minimal information such as the length of ciphertext.
Fei Han, Jing Qin
doaj   +1 more source

Home - About - Disclaimer - Privacy