![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Practical Single-Round Secure Wildcard Pattern Matching
Secure pattern matching allows a client who holds a substring (pattern) to find all the substring’s locations appearing in the long string (text) stored in a server. Meanwhile, the server should not learn any ...
-
Chapter and Conference Paper
An Enhanced Privacy-Preserving Hierarchical Federated Learning Framework for IoV
The intelligent Internet of Vehicles (IoV) can help alleviate road security issues. However, increasing requirements for data privacy make it difficult for centralized machine learning paradigms to collect suf...
-
Chapter and Conference Paper
Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning
As the most popular consensus algorithm for blockchain, the Proof-of-Work (PoW) is suffering from the inability of handling computing power fluctuations. Meanwhile, PoW consumes a significant amount of energy ...
-
Chapter and Conference Paper
Privacy Preserving Federated Learning Using CKKS Homomorphic Encryption
With the rapid development of distributed machine learning and Internet of things, tons of distributed data created by devices are used for model training and what comes along is the concern of security and pr...
-
Chapter and Conference Paper
Recovering the Weights of Convolutional Neural Network via Chosen Pixel Horizontal Power Analysis
In many scenarios, people have a demand for deploying the artificial intelligence applications on the edge device of IoT. For some special applications, these embedded devices are always required real-time rep...
-
Chapter and Conference Paper
A Lightweight Context-Based Android Malware Detection Scheme
Mobile device coverage is increasing as the Internet develops faster and faster. Android is becoming the most popular operating system among smartphones, where it is also the most common target for malware. Fo...
-
Chapter and Conference Paper
FolketID: A Decentralized Blockchain-Based NemID Alternative Against DDoS Attacks
Electronic Identity (eID) is a solution toward solving the identity problem when deploying e-Government. Such solution should not only be secure, but also have to be robust enough under adversarial conditions....
-
Article
Open AccessDepressive symptoms and health service utilization among Chinese middle-aged and older adults: a national population-based longitudinal survey
This study aimed to (1) examine the cross-sectional and longitudinal relationships between depressive symptoms and health services utilization among Chinese middle-aged and older adults; and (2) evaluate wheth...
-
Article
Open AccessA nomogram for predicting overall survival in patients with Ewing sarcoma: a SEER-based study
Ewing sarcoma, the second most frequent bone tumor in children and adolescents, is often presented with localized disease or metastatic-related symptoms. In this study, we aim to construct and validate a nomog...
-
Article
Open AccessMussel-Inspired Redox-Active and Hydrophilic Conductive Polymer Nanoparticles for Adhesive Hydrogel Bioelectronics
A universal strategy was proposed to producing conductive, redox-active, and hydrophilic sulfonated lignin-conductive polymer nanoparticles (CP/LS NP...
-
Article
Open AccessPlant-inspired adhesive and tough hydrogel based on Ag-Lignin nanoparticles-triggered dynamic redox catechol chemistry
Adhesive hydrogels have gained popularity in biomedical applications, however, traditional adhesive hydrogels often exhibit short-term adhesiveness, poor mechanical properties and lack of antibacterial ability...
-
Article
A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system
The notion of attribute-based proxy re-encryption extends the traditional proxy re-encryption to the attribute-based setting. In an attribute-based proxy re-encryption scheme, the proxy can convert a ciphertex...
-
Article
A proxy broadcast re-encryption for cloud data sharing
Proxy re-encryption (PRE) enables a semi-trusted proxy to automatically convert a delegator’s ciphertext to a delegate’s ciphertext without learning anything about the underlying plaintext. PRE schemes have br...
-
Article
Open AccessEffects of atomic-level nano-structured hydroxyapatite on adsorption of bone morphogenetic protein-7 and its derived peptide by computer simulation
Hydroxyapatite (HA) is the principal inorganic component of bones and teeth and has been widely used as a bone repair material because of its good biocompatibility and bioactivity. Understanding the interactio...
-
Article
Open AccessTough, self-healable and tissue-adhesive hydrogel with tunable multifunctionality
An ideal hydrogel for biomedical engineering should mimic the intrinsic properties of natural tissue, especially high toughness and self-healing ability, in order to withstand cyclic loading and repair skin an...
-
Article
Open AccessSelf-assembled Biodegradable Nanoparticles and Polysaccharides as Biomimetic ECM Nanostructures for the Synergistic effect of RGD and BMP-2 on Bone Formation
Producing biomimetic extracellular matrix (ECM) is an effective approach to improve biocompatibility of medical devices. In this study, biomimetic ECM nanostructures are constructed through layer-by-layer self...
-
Article
Graphene oxide and hyperbranched polymer-toughened hydrogels with improved absorption properties and durability
Hyperbranched polymers or/and graphene oxide nanosheets were used to synthesize poly(acrylic acid)-based hybrid hydrogels with high water absorption ability, excellent mechanical properties, and environmental ...
-
Article
On downstream transmissions in EPON Protocol over Coax (EPoC): An analysis of Coax framing approaches and other relevant considerations
We present different mechanisms for downstream transmissions in the coax segment of Ethernet Passive Optical Network (EPON) Protocol over Coax (EPoC). EPoC is the transparent extension of EPON over a cable ope...
-
Article
Fuzzy conditional proxy re-encryption
Weng et al. introduced the notion of conditional proxy re-encryption (C-PRE), whereby only the ciphertext satisfying one condition set by Alice can be re-encrypted by the proxy. To achieve more fine-grained de...
-
Article
Processing and characterization of TLCP fibers reinforced by 1 wt% MWCNT
A thermotropic liquid crystalline polymer (TLCP) blend with 1 wt% multiwall carbon nanotubes (MWCNTs) was prepared by melt compounding. Morphological observations of the blend show that the chemical-treated MW...