Vaccine development using artificial intelligence and machine learning: A review
VS Asediya, PA Anjaria, RA Mathakiya… - International Journal of …, 2024 - Elsevier
The COVID-19 pandemic has underscored the critical importance of effective vaccines, yet
their development is a challenging and demanding process. It requires identifying antigens …
their development is a challenging and demanding process. It requires identifying antigens …
Identity-Based Encryption with Disjunctive, Conjunctive and Range Keyword Search from Lattices
To reduce data storage costs, more individuals are using cloud servers for reliable, scalable,
cost-effective, and globally accessible solutions. However, storing data in plaintext on cloud …
cost-effective, and globally accessible solutions. However, storing data in plaintext on cloud …
Public-Key Inverted-Index Keyword Search With Designated Tester and Multiuser Key Decryption in IoT
Searchable encryption for Cloud-based Internet of Things has been widely explored with the
increasing popularity of cloud computing. The public-key encryption with keyword search …
increasing popularity of cloud computing. The public-key encryption with keyword search …
Ciphertext Fuzzy Retrieval Mechanism With Bidirectional Verification and Privacy Protection
T **e, L Yuan, Q Zhang, J Wu… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Searchable encryption (SE) and attribute-based SE (ABSE) enable accurate encrypted data
searches in cloud storage but face challenges, such as supporting only unidirectional …
searches in cloud storage but face challenges, such as supporting only unidirectional …
Noise-Resilient Homomorphic Encryption: A Framework for Secure Data Processing in Health care Domain
In this paper, we introduce the Fully Homomorphic Integrity Model (HIM), a novel approach
designed to enhance security, efficiency, and reliability in encrypted data processing …
designed to enhance security, efficiency, and reliability in encrypted data processing …
[PDF][PDF] Multi-keyword Ciphertext Sorting Search Based on Conformation Graph Convolution Model and Transformer Network in English Education
H Li, Z Li, X Wang, M Ibrar, X Zhu - International Journal of …, 2024 - ijns.jalaxy.com.tw
With the wide application of cloud computing, the outsourcing service model for data or
computing is more and more accepted by the industry. Because asymmetric searchable …
computing is more and more accepted by the industry. Because asymmetric searchable …
[PDF][PDF] Scalable Approaches for Enhancing Privacy in Blockchain Networks: A Comprehensive Review of Differential Privacy Techniques
PS Rao, SK Bunga, PVR Raju - 2024 - researchgate.net
The rapid adoption of blockchain technology in a number of industries, such as supply chain
management, healthcare, and finance, has intensified concerns surrounding data privacy …
management, healthcare, and finance, has intensified concerns surrounding data privacy …