Results 81 to 90 of about 2,429,355 (361)
Data Querying with Ciphertext Policy Attribute Based Encryption [PDF]
Data encryption limits the power and efficiency of queries. Direct processing of encrypted data should ideally be possible to avoid the need for data decryption, processing, and re-encryption. It is vital to keep the data searchable and sortable. That is, some information is intentionally leaked.
arxiv
miRNA‐29 regulates epidermal and mesenchymal functions in skin repair
miRNA‐29 inhibits cell‐to‐cell and cell‐to‐matrix adhesion by silencing mRNA targets. Adhesion is controlled by complex interactions between many types of molecules coded by mRNAs. This is crucial for keeping together the layers of the skin and for regenerating the skin after wounding.
Lalitha Thiagarajan+10 more
wiley +1 more source
A Rankable Boolean Searchable Encryption Scheme Supporting Dynamic Updates in a Cloud Environment
At present, three problems exist in searchable encryption in cloud storage services: firstly, most traditional searchable encryption schemes only support single-keyword search while fail to perform Boolean searches; even if a few schemes support Boolean ...
Sixu Guo+4 more
doaj +1 more source
Key-Aggregate Searchable Encryption, Revisited: Formal Foundations for Cloud Applications, and Their Implementation [PDF]
In the use of a cloud storage, sharing of data with efficient access control is an important requirement in addition to data security and privacy. Cui et al. (IEEE Trans. on Comp. 2016) proposed \textit{key-aggregate searchable encryption (KASE)}, which allows a data owner to issue an \textit{aggregate key} that enables a user to search in an ...
arxiv +1 more source
Searchable encryption enables users to enjoy search services while protecting the security and privacy of their outsourced data. Blockchain-enabled searchable encryption delivers the computing processes that are executed on the server to the ...
Jiujiang Han+6 more
semanticscholar +1 more source
Spot‐14 and Spot‐14R play distinct roles in regulating metabolism in brown and beige adipocytes. While both influence lipid and glucose pathways, Spot‐14 uniquely controls thermogenic gene expression. This dual regulation balances energy storage and heat production, highlighting potential therapeutic targets for obesity and metabolic disorders. Spot 14
Lidia Itzel Castro‐Rodríguez+3 more
wiley +1 more source
A Function Private Attribute-Based Encryption
The function privacy notion was proposed by Boneh, Raghunathan, and Segev in August 2013. It guarantees that the secret key reveals nothing to malicious adversary, beyond the unavoidable minimal information such as the length of ciphertext.
Fei Han, Jing Qin
doaj +1 more source
Ciphertext Database Audit Technology Under Searchable Encryption Algorithm and Blockchain Technology
The study aims to solve the problems in auditing ciphertext data, improve audit efficiency, and increase the security of audit data in the audit server. First, the existing encryption algorithms are analyzed.
J. Qiu
semanticscholar +1 more source
Subpar reporting of pre‐analytical variables in RNA‐focused blood plasma studies
Pre‐analytical variables strongly influence the analysis of extracellular RNA (cell‐free RNA; exRNA) derived from blood plasma. Their reporting is essential to allow interpretation and replication of results. By evaluating 200 exRNA studies, we pinpoint a lack of reporting pre‐analytical variables associated with blood collection, plasma preparation ...
Céleste Van Der Schueren+16 more
wiley +1 more source
Privacy-Preserving Genetic Relatedness Test [PDF]
An increasing number of individuals are turning to Direct-To-Consumer (DTC) genetic testing to learn about their predisposition to diseases, traits, and/or ancestry. DTC companies like 23andme and Ancestry.com have started to offer popular and affordable
De Cristofaro, Emiliano+2 more
core +1 more source