SENSH: a blockchain-based searchable encrypted data sharing scheme in smart healthcare. [PDF]
Luo S, Tan L, Hu T, Hu M.
europepmc +1 more source
Enhancing Leakage Attacks on Searchable Symmetric Encryption Using LLM-Based Synthetic Data Generation [PDF]
Jung-Chun Chiu +2 more
openalex +1 more source
A Mechanized Proof of Security for Searchable Symmetric Encryption [PDF]
Adam Petcher, Greg Morrisett
openalex +1 more source
A Guide to Bayesian Optimization in Bioprocess Engineering
ABSTRACT Bayesian optimization has become widely popular across various experimental sciences due to its favorable attributes: it can handle noisy data, perform well with relatively small data sets, and provide adaptive suggestions for sequential experimentation.
Maximilian Siska +5 more
wiley +1 more source
A Blockchain-Enabled Multi-Authority Secure IoT Data-Sharing Scheme with Attribute-Based Searchable Encryption for Intelligent Systems. [PDF]
Zhang F, Xia X, Gao H, Ma Z, Chen X.
europepmc +1 more source
Hyperpolarization by parahydrogen‐induced polarization enhances the sensitivity of nuclear magnetic resonance spectroscopy of amino acids, peptides, mini‐proteins, and biopolymers using nonnatural amino acids with unsaturated side chains up to three orders of magnitude.
Gerd Buntkowsky
wiley +1 more source
Provably lightweight and secure IoHT scheme with post-quantum cryptography and fog computing: A comprehensive scheme for healthcare system. [PDF]
Abood EW +4 more
europepmc +1 more source
Blockchain-based healthcare management system with two-side verifiability. [PDF]
Tan TL, Salam I, Singh M.
europepmc +1 more source
Advances in Triboelectric Nanogenerators With Rotating Structure
The rotating TENG has been widely studied for its superiorities of simple structure, high efficiency, and stable output. This review introduced the four different principles of rotating TENG and offered a thorough summary for performance and application research through three‐level classification. Importantly, the current existing problems, challenges,
Chuguo Zhang +4 more
wiley +1 more source
A Review of Functional Encryption in IoT Applications. [PDF]
Shahzad K, Zia T, Qazi EU.
europepmc +1 more source

