160 research outputs found
Comparison of three magnetization transfer ratio parameters for assessment of intestinal fibrosis in patients with Crohnâs disease
Recommended from our members
Fuzzy matching: multi-authority attribute searchable encryption without central authority
Attribute-based keyword search (ABKS) supports the access control on the search result based upon fuzzy identity over encrypted data, when the search operation is performed over outsourced encrypted data in cloud. However, almost ABKS schemes trust a single authority to monitor the attribute key for users. In practice, we usually have different entities responsible for monitoring different attribute keys to a user. Thus, it is not realistic to trust a single authority to monitor all attributes keys for ABKS scheme in practical situation. Although a large body of ABKS schemes have been proposed, few works have been done on multi-authority attribute searchable encryption. We propose a multi-authority attribute searchable encryption without central authority in this paper. Comparing previous ABKS schemes, we extend the single-authority ABKS scheme to multi-authority ABKS scheme and remove the central authority in multi-authority ABKS scheme. We analyze our scheme in terms of security and efficiency
Special Libraries, January 1925
Volume 16, Issue 1https://scholarworks.sjsu.edu/sla_sl_1925/1000/thumbnail.jp
Recommended from our members
Outsourced decentralized multi-authority attribute based signature and its application in IoT
IoT devices often collect data and store the data in the cloud for sharing and further processing. A natural solution for secure access is directly using the device owner?s identity as the private key to generate a signature for data authentication. However this will simultaneously expose this identity. Attribute based signature (ABS), which takes the signer?s attributes instead of his/her identity as the private key, can realize data authentication while preserving the signer?s identity privacy. In ABS, there are multiple authorities that issue different private keys for signers based on their various attributes, and a central authority is usually established to manage all these attribute authorities. However, one security concern is that if the central authority is compromised, the whole system will be broken. In this paper, we present an outsourced decentralized multi-authority attribute based signature (ODMA-ABS) scheme. The proposed ODMAABS achieves attribute privacy and stronger authority-corruption resistance than existing multi-authority attribute based signature schemes. In addition, the overhead to generate a signature is further reduced by outsourcing expensive computation to a signing cloud server. We provide extensive security analysis and experimental simulation of the proposed scheme. We also propose an access control scheme that is based on ODMA-ABS
Stabilizing Cu in Cu/SiO Catalysts with a Shattuckite-Like Structure Boosts CO2 Hydrogenation into Methanol
Recommended from our members
Confidentiality-preserving publicly verifiable computation schemes for polynomial evaluation and matrix-vector multiplication
With the development of cloud services, outsourcing computation tasks to a commercial cloud server has drawn attention of various communities, especially in the Big Data era. Public verifiability offers a flexible functionality in real circumstance where the cloud service provider (CSP) may be untrusted or some malicious users may slander the CSP on purpose. However, sometimes the computational result is sensitive and is supposed to remain undisclosed in the public verification phase, while existing works on publicly verifiable computation (PVC) fail to achieve this requirement. In this paper, we highlight the property of result confidentiality in publicly verifiable computation and present confidentiality-preserving public verifiable computation (CPPVC) schemes for multivariate polynomial evaluation and matrix-vector multiplication, respectively. The proposed schemes work efficiently under the amortized model and, compared with previous PVC schemes for these computations, achieve confidentiality of computational results, while maintaining the property of public verifiability. The proposed schemes proved to be secure, efficient, and result-confidential. In addition, we provide the algorithms and experimental simulation to show the performance of the proposed schemes, which indicates that our proposal is also acceptable in practice
A feasibility study on using smartphones to conduct short-version verbal autopsies in rural China
Background: Currently there are two main sources of mortality data with cause of death assignments in China. Both sources-the Ministry of Health-Vital Registration system and the Chinese Disease Surveillance Point system-present their own challenges. A new approach to cause of death assignment is a smartphone-based shortened version of a verbal autopsy survey. This study evaluates the feasibility and acceptability of this new method conducted by township health care providers (THP) and village doctors (VD) in rural China, where a large proportion of deaths occur in homes and cause of death data are inaccurate or lacking. Methods: The Population Health Metrics Research Consortium mobile phone-based shortened verbal autopsy questionnaire was made available on an Android system-based application, and cause of death was derived using the Tariff method (Tariff 2.0); we called this set of tools "msVA." msVA was administered to relatives of the deceased by six THPs and six VDs in 24 villages located in six townships of Luquan County, Hebei Province, China. Subsequently, interviews were conducted among 12 interviewers, 12 randomly selected respondents, and five study staff to assess the feasibility and acceptability of using msVA for mortality data collection. Results: Between July 2013 and August 2013, 268 deaths took place in the study villages. Among the 268 deaths, 227 VAs were completed (nine refusals, 31 migrations and one loss of data due to breakdown of the smartphone). The average time for a VA interview was 21.5 +/- 3.4 min (20.1 +/- 3.5 min for THP and 23.2 +/- 4.1 min for VD). Both THPs and VDs could be successful interviewers; the latter needed more training but had more willingness to implement msVA in the future. The interviews revealed that both interviewers and relatives of the deceased found msVA to be feasible, acceptable, and more desirable than traditional methods. The cost of conducting a new VA was $ 8.87 per death. Conclusions: Conduction of msVA by VDs in their own villages was feasible and acceptable in rural northern China. Broader implementation of msVA across rural China could potentially improve the coverage and quality of cause of death data, allowing for better national health evaluation and program planning.National Heart, Lung and Blood Institute, National Institutes of Health, Department of Health and Human Services [HHSN268200900034C]; NHLBI-UHG Trainee Seed [email protected]
Electrospun ZnO/Bi 2
ZnO/Bi2O3 nanofibers were synthesized by a simple electrospinning method and both the UV and visible light responsive photocatalytic properties were studied by the decolorization of RhB dye. Thermogravimetric analysis/differential thermal analysis (TGA-DTA), X-ray diffraction (XRD), scanning electron microscope (SEM), and UV-vis diffuse reflectance spectra (DRS) were employed to study the structure, morphology, and optical properties of the ZnO/Bi2O3 nanofibers, respectively. The relationship between the ZnO/Bi2O3 ratio and photocatalytic activity was also studied, and the composite with a molar ratio of 23â:â1 demonstrated the best activity under both excitations. The photocatalytic mechanisms for the composite fibers can be described as the direct photocatalysis under UV excitation and photosensitation for visible light irradiation. The enhanced photocatalytic activities can be ascribed to the effective electron-hole pairs separation that leads to the promoted photocatalytic efficiency
Inhibition of phosphorylated c-Met in rhabdomyosarcoma cell lines by a small molecule inhibitor SU11274
<p>Abstract</p> <p>Background</p> <p>c-Met is a receptor tyrosine kinase (RTK) that is over-expressed in a variety of cancers and involved in cell growth, invasion, metastasis and angiogenesis. In this study, we investigated the role of c-Met in rhabdomyosarcoma (RMS) using its small molecule inhibitor SU11274, which has been hypothesized to be a potential therapeutic target for RMS.</p> <p>Methods</p> <p>The expression level of phosphorylated c-Met in RMS cell lines (RD, CW9019 and RH30) and tumor tissues was assessed by phospho-RTK array and immunohistochemistry, respectively. The inhibition effects of SU11274 on RMS cells were studied with regard to intracellular signaling, cell proliferation, cell cycle and cell migration.</p> <p>Results</p> <p>A high level of phosphorylated c-Met was detected in 2 alveolar RMS cell lines (CW9019 and RH30) and 14 out of 24 RMS tissue samples, whereas relatively low levels of phospho-c-Met were observed in the embryonic RMS cell line (RD). The small molecule SU11274 could significantly reduce the phosphorylation of c-Met, resulting in inhibition of cell proliferation, G1 phase arrest of cell cycle and blocking of cell migration in CW9019 and RH30 cell lines.</p> <p>Conclusion</p> <p>These results might support the role of c-Met in the development and progression of RMS. Furthermore, the inhibitor of c-Met, SU11274, could be an effective targeting therapy reagent for RMS, especially alveolar RMS.</p
- âŚ