Results 41 to 50 of about 391 (240)

An Efficient Symmetric Searchable Encryption Scheme for Cloud Storage [PDF]

open access: yesJournal of Internet Services and Information Security, 2017
Symmetric searchable encryption for cloud storage enables users to retrieve the documents they want in a privacy-preserving way, which has become a hotspot of research.
Xiuxiu Jiang   +5 more
doaj  

Privacy-Protection Scheme of a Credit-Investigation System Based on Blockchain

open access: yesEntropy, 2021
In response to the rapid growth of credit-investigation data, data redundancy among credit-investigation agencies, privacy leakages of credit-investigation data subjects, and data security risks have been reported.
Ke Yuan   +5 more
doaj   +1 more source

Science‐Towards‐Technology Breakthrough in CO2 Electroreduction: Multiphysics, Multiscale, and Artificial Intelligence Insights

open access: yesAdvanced Materials, EarlyView.
Electrochemical CO2RR is a key technology for converting CO2 into chemicals, but there remains a gap between “laboratory science” and “engineering practice” in current research. This review establishes a multi‐scale research framework, encompassing atomic‐level characterization, microenvironment regulation, external field‐assisted optimization, and AI ...
Ping Hong   +3 more
wiley   +1 more source

Towards privacy-preserving dynamic deep packet inspection over outsourced middleboxes

open access: yesHigh-Confidence Computing, 2022
The prosperity of network function virtualization (NFV) pushes forward the paradigm of migrating in-house middleboxes to third-party providers, i.e., software (virtualized) middlebox services.
Chunxiao Li, Yu Guo, Xia Wang
doaj   +1 more source

LEAD: Literature Enhanced Ab Initio Discovery of Nitride Dusting Layers for Enhanced Tunnel Magnetoresistance and Lower Resistance Magnetic Tunnel Junctions

open access: yesAdvanced Materials, EarlyView.
Magnetic tunnel junctions (MTJs) using MgO tunnel barriers face challenges of high resistance‐area product and low tunnel magnetoresistance (TMR). To discover alternative materials, Literature Enhanced Ab initio Discovery (LEAD) is developed. The LEAD‐predicted materials are theoretically evaluated, showing that MTJs with dusting of ScN or TiN on ...
Sabiq Islam   +6 more
wiley   +1 more source

The Locality of Searchable Symmetric Encryption [PDF]

open access: yes, 2014
This paper proves a lower bound on the trade-off between server storage size and the locality of memory accesses in searchable symmetric encryption (SSE). Namely, when encrypting an index of N identifier/keyword pairs, the encrypted index must have size ω(N) or the scheme must perform searching with ω(1) non-contiguous reads to memory or the scheme ...
David Cash, Stefano Tessaro
openaire   +1 more source

Two‐Photon 3D Printing of Functional Microstructures Inside Living Cells

open access: yesAdvanced Materials, EarlyView.
This study demonstrates 3D printing inside living cells by using two‐photon photo‐lithography. A bio‐compatible photoresist is injected into cells and selectively polymerized with a femtosecond laser, creating custom‐shaped intracellular structures with submicron resolution.
Maruša Mur   +4 more
wiley   +1 more source

Efficient and scalable architecture for searchable symmetric encryption

open access: yesTongxin xuebao, 2017
The existing encryption schemes were usua11y poor of index construction and maintenance,which was difficu1t to meet the retrieva1 requirements for distributed ciphertext.Aiming at the above shortage of existing schemes,a structure of separab1e ciphertext
Zhi-qiang WU, Ken-li LI, Hui ZHENG
doaj   +2 more sources

Generative Models for Crystalline Materials

open access: yesAdvanced Materials, EarlyView.
Generative machine learning models are increasingly used in crystalline materials design. This review outlines major generative approaches and assesses their strengths and limitations. It also examines how generative models can be adapted to practical applications, discusses key experimental considerations for evaluating generated structures, and ...
Houssam Metni   +15 more
wiley   +1 more source

Substring Position Search over Encrypted Cloud Data Supporting Efficient Multi-User Setup

open access: yesFuture Internet, 2016
Existing Searchable Encryption (SE) solutions are able to handle simple Boolean search queries, such as single or multi-keyword queries, but cannot handle substring search queries over encrypted data that also involve identifying the position of the ...
Mikhail Strizhov   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy