Vaccine development using artificial intelligence and machine learning: A review

VS Asediya, PA Anjaria, RA Mathakiya… - International Journal of …, 2024 - Elsevier
The COVID-19 pandemic has underscored the critical importance of effective vaccines, yet
their development is a challenging and demanding process. It requires identifying antigens …

Identity-Based Encryption with Disjunctive, Conjunctive and Range Keyword Search from Lattices

Z Lin, H Li, X Chen, M **ao… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
To reduce data storage costs, more individuals are using cloud servers for reliable, scalable,
cost-effective, and globally accessible solutions. However, storing data in plaintext on cloud …

Public-Key Inverted-Index Keyword Search With Designated Tester and Multiuser Key Decryption in IoT

N Gao, K Fan, H Wang, K Zhang, H Li… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Searchable encryption for Cloud-based Internet of Things has been widely explored with the
increasing popularity of cloud computing. The public-key encryption with keyword search …

Ciphertext Fuzzy Retrieval Mechanism With Bidirectional Verification and Privacy Protection

T **e, L Yuan, Q Zhang, J Wu… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Searchable encryption (SE) and attribute-based SE (ABSE) enable accurate encrypted data
searches in cloud storage but face challenges, such as supporting only unidirectional …

Noise-Resilient Homomorphic Encryption: A Framework for Secure Data Processing in Health care Domain

B Shuriya, SV Kumar, K Bagyalakshmi - arxiv preprint arxiv:2412.11474, 2024 - arxiv.org
In this paper, we introduce the Fully Homomorphic Integrity Model (HIM), a novel approach
designed to enhance security, efficiency, and reliability in encrypted data processing …

[PDF][PDF] Multi-keyword Ciphertext Sorting Search Based on Conformation Graph Convolution Model and Transformer Network in English Education

H Li, Z Li, X Wang, M Ibrar, X Zhu - International Journal of …, 2024 - ijns.jalaxy.com.tw
With the wide application of cloud computing, the outsourcing service model for data or
computing is more and more accepted by the industry. Because asymmetric searchable …

[PDF][PDF] Scalable Approaches for Enhancing Privacy in Blockchain Networks: A Comprehensive Review of Differential Privacy Techniques

PS Rao, SK Bunga, PVR Raju - 2024 - researchgate.net
The rapid adoption of blockchain technology in a number of industries, such as supply chain
management, healthcare, and finance, has intensified concerns surrounding data privacy …