Results 91 to 100 of about 31,005 (332)
State of The Art and Hot Aspects in Cloud Data Storage Security [PDF]
Along with the evolution of cloud computing and cloud storage towards matu- rity, researchers have analyzed an increasing range of cloud computing security aspects, data security being an important topic in this area.
Gehrmann, Christian +2 more
core +3 more sources
This review explores advances in wearable and lab‐on‐chip technologies for breast cancer detection. Covering tactile, thermal, ultrasound, microwave, electrical impedance tomography, electrochemical, microelectromechanical, and optical systems, it highlights innovations in flexible electronics, nanomaterials, and machine learning.
Neshika Wijewardhane +4 more
wiley +1 more source
Information Transmission Strategies for Self‐Organized Robotic Aggregation
In this review, we discuss how information transmission influences the neighbor‐based self‐organized aggregation of swarm robots. We focus specifically on local interactions regarding information transfer and categorize previous studies based on the functions of the information exchanged.
Shu Leng +5 more
wiley +1 more source
Privacy-Preserving Keyword Search With Access Control for Secret Sharing-Based Data Outsourcing
Searchable encryption, also known as secure search, is a technology that enables search operations on encrypted data while maintaining confidentiality.
Ahmad Akmal Aminuddin Mohd Kamal +2 more
doaj +1 more source
Collision‐Resilient Winged Drones Enabled by Tensegrity Structures
Based on structures of birds such as the woodpeck, this article presents the collision‐resilient aerial robot, SWIFT. SWIFT leverages tensegrity structures in the fuselage and wings which allow it to undergo large deformations in a crash, without sustaining damage. Experiments show that SWIFT can reduce impact forces by 70% over conventional structures.
Omar Aloui +5 more
wiley +1 more source
M-SSE: An Effective Searchable Symmetric Encryption With Enhanced Security for Mobile Devices
Searchable encryption allows mobile devices with limited computing and storage resources to outsource data to an untrusted cloud server. Users are able to search and retrieve the outsourced data; however, it suffers from information and privacy leakage ...
Chongzhi Gao +5 more
doaj +1 more source
The Cloud we Share: Access Control on Symmetrically Encrypted Data in Untrusted Clouds
Along with the rapid growth of cloud environments, rises the problem of secure data storage-a problem that both businesses and end-users take into consideration before moving their data online. Recently, a lot of solutions have been proposed based either
Alexandros Bakas +3 more
doaj +1 more source
BioE is a new diiron oxygenase that catalyzes the conversion of long‐chain acyl groups into pimeloyl thioester, initiating biotin synthesis. The overexpression of EmBioE disrupts lipid metabolic homeostasis, requiring repressor BioL to maintain a balance between long‐chain fatty acids and biotin synthesis.
Meng Zhang +9 more
wiley +1 more source
Less leakage and more precise: Efficient wildcard keyword search over encrypted data
Wildcard searchable encryption allows the server to efficiently perform wildcard-based keyword searches over encrypted data while maintaining data privacy.
Yunling Wang +4 more
doaj +1 more source
Motivated by the problem of simultaneously preserving confidentiality and usability of data outsourced to third-party clouds, we present two different database encryption schemes that largely hide data but reveal enough information to support a wide ...
Basin D. +8 more
core +1 more source

