Results 71 to 80 of about 2,429,355 (361)

Encrypted Shared Data Spaces [PDF]

open access: yes, 2008
The deployment of Share Data Spaces in open, possibly hostile, environments arises the need of protecting the confidentiality of the data space content.
A. Wood   +13 more
core   +2 more sources

Comments on "Dynamic Consensus Committee-Based for Secure Data Sharing With Authorized Multi-Receiver Searchable Encryption" [PDF]

open access: yesarXiv, 2023
Recently, Yang et al. introduced an efficient searchable encryption scheme titled "Dynamic Consensus Committee-Based for Secure Data Sharing With Authorized Multi-Receiver Searchable Encryption (DCC-SE)," published in IEEE Transactions on Information Forensics and Security (DOI: 10.1109/TIFS.2023.3305183).
arxiv  

Privacy-preserving targeted advertising scheme for IPTV using the cloud [PDF]

open access: yes, 2012
In this paper, we present a privacy-preserving scheme for targeted advertising via the Internet Protocol TV (IPTV). The scheme uses a communication model involving a collection of viewers/subscribers, a content provider (IPTV), an advertiser, and a cloud
Javid Khayati, Leyli   +6 more
core   +2 more sources

Attribute-Based Searchable Encryption: A Survey

open access: yesElectronics
With the advent of the big data era, the size and complexity of data continue to increase, which makes the requirement for data privacy and security increasingly urgent.
Li Yan   +7 more
semanticscholar   +1 more source

Multi-server conjunctive keyword searchable encryption scheme based on BDH problem

open access: yesDianxin kexue, 2020
Searchable encryption is a cryptographic primitive that supports users to search for keywords on ciphertext.In view of the low efficiency of traditional single-server searchable encryption schemes,it was based on the advantages of identity management in ...
Yanhua LU, Youliang TIAN, Chen LIU
doaj   +2 more sources

Deterministic and Efficiently Searchable Encryption [PDF]

open access: yes, 2007
We present as-strong-as-possible definitions of privacy, and constructions achieving them, for public-key encryption schemes where the encryption algorithm is deterministic. We obtain as a consequence database encryption methods that permit fast (i.e. sub-linear, and in fact logarithmic, time) search while provably providing privacy that is as strong ...
Alexandra Boldyreva   +2 more
openaire   +2 more sources

A Survey on Searchable Symmetric Encryption

open access: yesACM Computing Surveys, 2023
Outsourcing data to the cloud has become prevalent, so Searchable Symmetric Encryption (SSE), one of the methods for protecting outsourced data, has arisen widespread interest. Moreover, many novel technologies and theories have emerged, especially for the attacks on SSE and privacy-preserving. But most surveys related to SSE concentrate on one aspect (
Feng Li   +5 more
openaire   +2 more sources

Refining the NaV1.7 pharmacophore of a class of venom‐derived peptide inhibitors via a combination of in silico screening and rational engineering

open access: yesFEBS Letters, EarlyView.
Venom peptides have shown promise in treating pain. Our study uses computer screening to identify a peptide that targets a sodium channel (NaV1.7) linked to chronic pain. We produced the peptide in the laboratory and refined its design, advancing the search for innovative pain therapies.
Gagan Sharma   +8 more
wiley   +1 more source

Longitude : a privacy-preserving location sharing protocol for mobile applications [PDF]

open access: yes, 2011
Location sharing services are becoming increasingly popular. Although many location sharing services allow users to set up privacy policies to control who can access their location, the use made by service providers remains a source of concern.
A. Beresford   +14 more
core   +1 more source

Identification of novel small molecule inhibitors of ETS transcription factors

open access: yesFEBS Letters, EarlyView.
ETS transcription factors play an essential role in tumourigenesis and are indispensable for sprouting angiogenesis, a hallmark of cancer, which fuels tumour expansion and dissemination. Thus, targeting ETS transcription factor function could represent an effective, multifaceted strategy to block tumour growth. The evolutionarily conserved E‐Twenty‐Six
Shaima Abdalla   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy