Results 71 to 80 of about 2,429,355 (361)
Encrypted Shared Data Spaces [PDF]
The deployment of Share Data Spaces in open, possibly hostile, environments arises the need of protecting the confidentiality of the data space content.
A. Wood+13 more
core +2 more sources
Comments on "Dynamic Consensus Committee-Based for Secure Data Sharing With Authorized Multi-Receiver Searchable Encryption" [PDF]
Recently, Yang et al. introduced an efficient searchable encryption scheme titled "Dynamic Consensus Committee-Based for Secure Data Sharing With Authorized Multi-Receiver Searchable Encryption (DCC-SE)," published in IEEE Transactions on Information Forensics and Security (DOI: 10.1109/TIFS.2023.3305183).
arxiv
Privacy-preserving targeted advertising scheme for IPTV using the cloud [PDF]
In this paper, we present a privacy-preserving scheme for targeted advertising via the Internet Protocol TV (IPTV). The scheme uses a communication model involving a collection of viewers/subscribers, a content provider (IPTV), an advertiser, and a cloud
Javid Khayati, Leyli+6 more
core +2 more sources
Attribute-Based Searchable Encryption: A Survey
With the advent of the big data era, the size and complexity of data continue to increase, which makes the requirement for data privacy and security increasingly urgent.
Li Yan+7 more
semanticscholar +1 more source
Multi-server conjunctive keyword searchable encryption scheme based on BDH problem
Searchable encryption is a cryptographic primitive that supports users to search for keywords on ciphertext.In view of the low efficiency of traditional single-server searchable encryption schemes,it was based on the advantages of identity management in ...
Yanhua LU, Youliang TIAN, Chen LIU
doaj +2 more sources
Deterministic and Efficiently Searchable Encryption [PDF]
We present as-strong-as-possible definitions of privacy, and constructions achieving them, for public-key encryption schemes where the encryption algorithm is deterministic. We obtain as a consequence database encryption methods that permit fast (i.e. sub-linear, and in fact logarithmic, time) search while provably providing privacy that is as strong ...
Alexandra Boldyreva+2 more
openaire +2 more sources
A Survey on Searchable Symmetric Encryption
Outsourcing data to the cloud has become prevalent, so Searchable Symmetric Encryption (SSE), one of the methods for protecting outsourced data, has arisen widespread interest. Moreover, many novel technologies and theories have emerged, especially for the attacks on SSE and privacy-preserving. But most surveys related to SSE concentrate on one aspect (
Feng Li+5 more
openaire +2 more sources
Venom peptides have shown promise in treating pain. Our study uses computer screening to identify a peptide that targets a sodium channel (NaV1.7) linked to chronic pain. We produced the peptide in the laboratory and refined its design, advancing the search for innovative pain therapies.
Gagan Sharma+8 more
wiley +1 more source
Longitude : a privacy-preserving location sharing protocol for mobile applications [PDF]
Location sharing services are becoming increasingly popular. Although many location sharing services allow users to set up privacy policies to control who can access their location, the use made by service providers remains a source of concern.
A. Beresford+14 more
core +1 more source
Identification of novel small molecule inhibitors of ETS transcription factors
ETS transcription factors play an essential role in tumourigenesis and are indispensable for sprouting angiogenesis, a hallmark of cancer, which fuels tumour expansion and dissemination. Thus, targeting ETS transcription factor function could represent an effective, multifaceted strategy to block tumour growth. The evolutionarily conserved E‐Twenty‐Six
Shaima Abdalla+9 more
wiley +1 more source