Results 61 to 70 of about 31,005 (332)

Synchrotron Radiation for Quantum Technology

open access: yesAdvanced Functional Materials, EarlyView.
Materials and interfaces underpin quantum technologies, with synchrotron and FEL methods key to understanding and optimizing them. Advances span superconducting and semiconducting qubits, 2D materials, and topological systems, where strain, defects, and interfaces govern performance.
Oliver Rader   +10 more
wiley   +1 more source

Shared and searchable encrypted data for untrusted servers [PDF]

open access: yes, 2011
Current security mechanisms are not suitable for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client side is the normal approach in this situation but has high communication and ...
Dong, Changyu   +2 more
core   +1 more source

A Smart Magnetically Actuated Flip‐Disc Programmable Metasurface with Ultralow Power Consumption for Real‐Time Channel Control

open access: yesAdvanced Functional Materials, EarlyView.
The study proposes a 1‐bit programmable metasurface based on flip‐disc display, named flip‐disc metasurface (FD‐MTS). This new design enables ultralow energy consumption while maintaining coding patterns. It also exhibits high scalability and multifunctional flexibility.
Jiang Han Bao   +8 more
wiley   +1 more source

Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control

open access: yesJournal of Sensor and Actuator Networks
Untrusted servers are servers or storage entities lacking complete trust from the data owner or users. This characterization implies that the server hosting encrypted data may not enjoy full trust from data owners or users, stemming from apprehensions ...
Salim Sabah Bulbul   +5 more
doaj   +1 more source

Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency [PDF]

open access: yes, 2017
Recently, several practical attacks raised serious concerns over the security of searchable encryption. The attacks have brought emphasis on forward privacy, which is the key concept behind solutions to the adaptive leakage-exploiting attacks, and will ...
Dong, Changyu   +4 more
core   +1 more source

An efficient PHR service system supporting fuzzy keyword search and fine-grained access control [PDF]

open access: yes, 2013
Outsourcing of personal health record (PHR) has attracted considerable interest recently. It can not only bring much convenience to patients, it also allows efficient sharing of medical information among researchers.
Chen, Xiaofeng   +5 more
core   +2 more sources

Contact Lens with Moiré Patterns for High‐Precision Eye Tracking

open access: yesAdvanced Functional Materials, EarlyView.
This work presents a passive contact lens for high‐precision eye tracking, integrating a microscopic moiré grating label. The parallax‐induced shift of macroscopic moiré patterns enables angle measurement with 0.28° precision using a standard camera under ambient light.
Ilia M. Fradkin   +11 more
wiley   +1 more source

GraphSE$^2$: An Encrypted Graph Database for Privacy-Preserving Social Search

open access: yes, 2019
In this paper, we propose GraphSE$^2$, an encrypted graph database for online social network services to address massive data breaches. GraphSE$^2$ preserves the functionality of social search, a key enabler for quality social network services, where ...
Beaver D.   +8 more
core   +1 more source

LocLess: Do You Really Care Where Your Cloud Files Are? [PDF]

open access: yes, 2016
Physical location of data in cloud storage is a problem that gains a lot of attention not only from the actual cloud providers but also from the end users' who lately raise many concerns regarding the privacy of their data.
Michalas, A.   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy