Results 81 to 90 of about 31,005 (332)
Towards privacy-preserving dynamic deep packet inspection over outsourced middleboxes
The prosperity of network function virtualization (NFV) pushes forward the paradigm of migrating in-house middleboxes to third-party providers, i.e., software (virtualized) middlebox services.
Chunxiao Li, Yu Guo, Xia Wang
doaj +1 more source
Privacy-Preserving Genetic Relatedness Test [PDF]
An increasing number of individuals are turning to Direct-To-Consumer (DTC) genetic testing to learn about their predisposition to diseases, traits, and/or ancestry. DTC companies like 23andme and Ancestry.com have started to offer popular and affordable
De Cristofaro, Emiliano +2 more
core +1 more source
Multi-user multi-keyword ranked search scheme in arbitrary language is a novel multi-keyword rank searchable encryption (MRSE) framework based on Paillier Cryptosystem with Threshold Decryption (PCTD).
Abedin, Zain Ul +5 more
core +1 more source
Opportunities of Semiconducting Oxide Nanostructures as Advanced Luminescent Materials in Photonics
The review discusses the challenges of wide and ultrawide bandgap semiconducting oxides as a suitable material platform for photonics. They offer great versatility in terms of tuning microstructure, native defects, doping, anisotropy, and micro‐ and nano‐structuring. The review focuses on their light emission, light‐confinement in optical cavities, and
Ana Cremades +7 more
wiley +1 more source
The Locality of Searchable Symmetric Encryption [PDF]
This paper proves a lower bound on the trade-off between server storage size and the locality of memory accesses in searchable symmetric encryption (SSE). Namely, when encrypting an index of N identifier/keyword pairs, the encrypted index must have size ω(N) or the scheme must perform searching with ω(1) non-contiguous reads to memory or the scheme ...
David Cash, Stefano Tessaro
openaire +1 more source
Magnetic tunnel junctions (MTJs) using MgO tunnel barriers face challenges of high resistance‐area product and low tunnel magnetoresistance (TMR). To discover alternative materials, Literature Enhanced Ab initio Discovery (LEAD) is developed. The LEAD‐predicted materials are theoretically evaluated, showing that MTJs with dusting of ScN or TiN on ...
Sabiq Islam +6 more
wiley +1 more source
Efficient and scalable architecture for searchable symmetric encryption
The existing encryption schemes were usua11y poor of index construction and maintenance,which was difficu1t to meet the retrieva1 requirements for distributed ciphertext.Aiming at the above shortage of existing schemes,a structure of separab1e ciphertext
Zhi-qiang WU, Ken-li LI, Hui ZHENG
doaj +2 more sources
Substring Position Search over Encrypted Cloud Data Supporting Efficient Multi-User Setup
Existing Searchable Encryption (SE) solutions are able to handle simple Boolean search queries, such as single or multi-keyword queries, but cannot handle substring search queries over encrypted data that also involve identifying the position of the ...
Mikhail Strizhov +2 more
doaj +1 more source
Two‐Photon 3D Printing of Functional Microstructures Inside Living Cells
This study demonstrates 3D printing inside living cells by using two‐photon photo‐lithography. A bio‐compatible photoresist is injected into cells and selectively polymerized with a femtosecond laser, creating custom‐shaped intracellular structures with submicron resolution.
Maruša Mur +4 more
wiley +1 more source
The research of searchable symmetric encryption (SSE) has been focused on the trade-off between security, performance, and functionality. Recently proposed Hidden Cross-Tags (HXT) protocol improves the Oblivious Cross-Tags (OXT) by avoiding the leakage ...
Changshe Ma, Yiping Gu, Hongfei Li
doaj +1 more source

