Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (131)
  • Open Access

    ARTICLE

    Selection of Conservation Practices in Different Vineyards Impacts Soil, Vines and Grapes Quality Attributes

    Antonios Chrysargyris1,*, Demetris Antoniou2, Timos Boyias2, Nikolaos Tzortzakis1,*

    Phyton-International Journal of Experimental Botany, Vol.95, No.1, 2026, DOI:10.32604/phyton.2026.076565 - 30 January 2026

    Abstract Cyprus has an extensive record in grape production and winemaking. Grapevine is essential for the economic and environmental sustainability of the agricultural sector, as it is in other Mediterranean regions. Intensive agriculture can overuse and exhaust natural resources, including soil and water. The current study evaluated how conservation strategies, including no tillage and semi-tillage (as a variation of strip tillage), affected grapevine growth and grape quality when compared to conventional tillage application. Two cultivars were used: Chardonnay and Maratheftiko (indigenous). Soil pH decreased, and EC increased after tillage applications, in both vineyards. Tillage lowered soil… More >

  • Open Access

    ARTICLE

    LUAR: Lightweight and Universal Attribute Revocation Mechanism with SGX Assistance towards Applicable ABE Systems

    Fei Tang1,*, Ping Wang1, Jiang Yu1, Huihui Zhu1, Mengxue Qin1, Ling Yang2

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.073423 - 12 January 2026

    Abstract Attribute-Based Encryption (ABE) has emerged as a fundamental access control mechanism in data sharing, enabling data owners to define flexible access policies. A critical aspect of ABE is key revocation, which plays a pivotal role in maintaining security. However, existing key revocation mechanisms face two major challenges: (1) High overhead due to ciphertext and key updates, primarily stemming from the reliance on revocation lists during attribute revocation, which increases computation and communication costs. (2) Limited universality, as many attribute revocation mechanisms are tailored to specific ABE constructions, restricting their broader applicability. To address these challenges,… More >

  • Open Access

    ARTICLE

    Mitigating Attribute Inference in Split Learning via Channel Pruning and Adversarial Training

    Afnan Alhindi*, Saad Al-Ahmadi, Mohamed Maher Ben Ismail

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.072625 - 12 January 2026

    Abstract Split Learning (SL) has been promoted as a promising collaborative machine learning technique designed to address data privacy and resource efficiency. Specifically, neural networks are divided into client and server sub-networks in order to mitigate the exposure of sensitive data and reduce the overhead on client devices, thereby making SL particularly suitable for resource-constrained devices. Although SL prevents the direct transmission of raw data, it does not alleviate entirely the risk of privacy breaches. In fact, the data intermediately transmitted to the server sub-model may include patterns or information that could reveal sensitive data. Moreover,… More >

  • Open Access

    ARTICLE

    Searchable Attribute-Based Encryption with Multi-Keyword Fuzzy Matching for Cloud-Based IoT

    He Duan, Shi Zhang*, Dayu Li

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-25, 2026, DOI:10.32604/cmc.2025.069628 - 09 December 2025

    Abstract Internet of Things (IoT) interconnects devices via network protocols to enable intelligent sensing and control. Resource-constrained IoT devices rely on cloud servers for data storage and processing. However, this cloud-assisted architecture faces two critical challenges: the untrusted cloud services and the separation of data ownership from control. Although Attribute-based Searchable Encryption (ABSE) provides fine-grained access control and keyword search over encrypted data, existing schemes lack of error tolerance in exact multi-keyword matching. In this paper, we proposed an attribute-based multi-keyword fuzzy searchable encryption with forward ciphertext search (FCS-ABMSE) scheme that avoids computationally expensive bilinear pairing… More >

  • Open Access

    REVIEW

    Attribute-Based Encryption for IoT Environments—A Critical Survey

    Daskshnamoorthy Manivannan*

    Journal on Internet of Things, Vol.7, pp. 71-97, 2025, DOI:10.32604/jiot.2025.072809 - 24 December 2025

    Abstract Attribute-Based Encryption (ABE) secures data by tying decryption rights to user attributes instead of identities, enabling fine-grained access control. However, many ABE schemes are unsuitable for Internet of Things (IoT) due to limited device resources. This paper critically surveys ABE schemes developed specifically for IoT over the past decade, examining their evolution, strengths, limitations, and access control capabilities. It provides insights into their security, effectiveness, and real-world applicability, highlights the current state of ABE in securing IoT data and access, and discusses remaining challenges and open issues. More >

  • Open Access

    ARTICLE

    Attribute-Based Encryption for Secure Access Control in Personal Health Records

    Dakshnamoorthy Manivannan*

    Computer Systems Science and Engineering, Vol.49, pp. 533-555, 2025, DOI:10.32604/csse.2025.072267 - 08 December 2025

    Abstract Attribute-based Encryption (ABE) enhances the confidentiality of Electronic Health Records (EHR) (also known as Personal Health Records (PHR)) by binding access rights not to individual identities, but to user attribute sets such as roles, specialties, or certifications. This data-centric cryptographic paradigm enables highly fine-grained, policy-driven access control, minimizing the need for identity management and supporting scalable multi-user scenarios. This paper presents a comprehensive and critical survey of ABE schemes developed specifically for EHR/PHR systems over the past decade. It explores the evolution of these schemes, analyzing their design principles, strengths, limitations, and the level of More >

  • Open Access

    REVIEW

    Attribute-Based Encryption Methods That Support Searchable Encryption

    Daskshnamoorthy Manivannan*

    Journal of Cyber Security, Vol.7, pp. 505-531, 2025, DOI:10.32604/jcs.2025.072810 - 28 November 2025

    Abstract Attribute-Based Encryption (ABE) secures data by linking decryption rights to user attributes rather than user identities, enabling fine-grained access control. While ABE is effective for enforcing access policies, integrating it with Searchable Encryption (SE)—which allows searching encrypted data without decryption—remains a complex challenge. This paper presents a comprehensive survey of ABE schemes that support SE proposed over the past decade. It critically analyzes their strengths, limitations, and access control capabilities. The survey offers insights into the security, efficiency, and practical applicability of these schemes, outlines the current landscape of ABE-integrated SE, and identifies key challenges More >

  • Open Access

    ARTICLE

    A Unified Parametric Divergence Operator for Fermatean Fuzzy Environment and Its Applications in Machine Learning and Intelligent Decision-Making

    Zhe Liu1,2,3,*, Sijia Zhu4, Yulong Huang1,*, Tapan Senapati5,6,7, Xiangyu Li8, Wulfran Fendzi Mbasso9, Himanshu Dhumras10, Mehdi Hosseinzadeh11,12,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.2, pp. 2157-2188, 2025, DOI:10.32604/cmes.2025.072352 - 26 November 2025

    Abstract Uncertainty and ambiguity are pervasive in real-world intelligent systems, necessitating advanced mathematical frameworks for effective modeling and analysis. Fermatean fuzzy sets (FFSs), as a recent extension of classical fuzzy theory, provide enhanced flexibility for representing complex uncertainty. In this paper, we propose a unified parametric divergence operator for FFSs, which comprehensively captures the interplay among membership, non-membership, and hesitation degrees. The proposed operator is rigorously analyzed with respect to key mathematical properties, including non-negativity, non-degeneracy, and symmetry. Notably, several well-known divergence operators, such as Jensen-Shannon divergence, Hellinger distance, and χ2-divergence, are shown to be special cases More >

  • Open Access

    ARTICLE

    Predicting Soil Carbon Pools in Central Iran Using Random Forest: Drivers and Uncertainty Analysis

    Shohreh Moradpour1,#, Shuai Zhao2,#, Mojgan Entezari1, Shamsollah Ayoubi3,*, Seyed Roohollah Mousavi4

    Revue Internationale de Géomatique, Vol.34, pp. 809-829, 2025, DOI:10.32604/rig.2025.069538 - 06 November 2025

    Abstract Accurate spatial prediction of soil organic carbon (SOC) and soil inorganic carbon (SIC) is vital for land management decisions. This study targets SOC/SIC mapping challenges at the watershed scale in central Iran by addressing environmental heterogeneity through a random forest (RF) model combined with bootstrapping to assess prediction uncertainty. Thirty-eight environmental variables—categorized into climatic, soil physicochemical, topographic, geomorphic, and remote sensing (RS)-based factors—were considered. Variable importance analysis (via) and partial dependence plots (PDP) identified land use, RS indices, and topography as key predictors of SOC. For SIC, soil reflectance (Bands 5 and 7, ETM+), topography, More > Graphic Abstract

    Predicting Soil Carbon Pools in Central Iran Using Random Forest: Drivers and Uncertainty Analysis

  • Open Access

    ARTICLE

    A Study on Re-Identification of Natural Language Data Considering Korean Attributes

    Segyeong Bang#, Soeun Kim#, Gaeun Ahn, Hyemin Hong, Junhyoung Oh*

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 4629-4643, 2025, DOI:10.32604/cmc.2025.068221 - 23 October 2025

    Abstract This study analyzes the risks of re-identification in Korean text data and proposes a secure, ethical approach to data anonymization. Following the ‘Lee Luda’ AI chatbot incident, concerns over data privacy have increased. The Personal Information Protection Commission of Korea conducted inspections of AI services, uncovering 850 cases of personal information in user input datasets, highlighting the need for pseudonymization standards. While current anonymization techniques remove personal data like names, phone numbers, and addresses, linguistic features such as writing habits and language-specific traits can still identify individuals when combined with other data. To address this,… More >

Displaying 1-10 on page 1 of 131. Per Page