Results 161 to 170 of about 31,005 (332)
On the Performance of Secure Sharing of Classified Threat Intelligence between Multiple Entities. [PDF]
Fernandes R, Bugla S, Pinto P, Pinto A.
europepmc +1 more source
Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data
Pallavi S. Bangare +4 more
openalex +1 more source
Physically Based Predictive Modelling of Archaeological Proxies Using Cropmarks
ABSTRACT Cropmarks, as archaeological proxies, offer a valuable means of detecting buried sites through remote sensing. Yet, the scalability of such methods across varied archaeological contexts remains underexplored, and AI‐based modelling approaches are still in early stages.
Elias Gravanis, Athos Agapiou
wiley +1 more source
Generative Deep Learning for Advanced Battery Materials
This review explores the role of generative deep learning (DL) in battery materials analysis and highlights the fundamental principles of generative DL and its applications in designing battery materials. The importance of using multimodal data is underscored to effectively address the challenges faced during the development of battery materials across
Deepalaxmi Rajagopal +3 more
wiley +1 more source
No-Dictionary Searchable Symmetric Encryption
Wakaha Ogata, Kaoru Kurosawa
openaire +2 more sources
Aims Glycogen storage disease type Ib (GSD‐Ib) is a rare genetic disorder causing neutropenia and neutrophil dysfunction in children. G‐CSF has been the primary treatment, but emerging data support the potential of empagliflozin, an SGLT2 inhibitor, as a promising investigational option.
Elizabeth Iwasyk +5 more
wiley +1 more source
Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley +1 more source
BloomSec: Scalable and privacy-preserving searchable encryption for cloud environments. [PDF]
Khan AN +5 more
europepmc +1 more source
Abstract This article examines how UK and US universities manage racial equality regimes through governance structures that prioritise institutional reputation over substantive racial justice reform. Drawing on Bourdieu's field, habitus and capital theory, the study demonstrates how universities neutralise racial justice efforts through bureaucratic ...
David Roberts
wiley +1 more source

