Showing 2,281 - 2,300 results of 7,384 for search 'MTNL~', query time: 1.03s Refine Results
  1. 2281
  2. 2282
  3. 2283
  4. 2284
  5. 2285
  6. 2286

    Comparative Analysis of the Antioxidant and Antidiabetic Potential of Nelumbo nucifera Gaertn. and Nymphaea lotus L. var. pubescens (Willd.) by Tamlal Pokhrel, Dipesh Shrestha, Kamal Dhakal, Paras Mani Yadav, Achyut Adhikari

    Published 2022-01-01
    “…The IC50 values of the crude extract and its fractions of N. nucifera against the DPPH free radical ranged from 33.46 ± 0.6 to 3.52 ± 0.09 μg/mL, while that of the N. pubescens ranged from 14.30 ± 0.43 to 1.43 ± 0.08 μg/mL. …”
    Get full text
    Article
  7. 2287
  8. 2288
  9. 2289
  10. 2290
  11. 2291
  12. 2292
  13. 2293
  14. 2294
  15. 2295
  16. 2296
  17. 2297
  18. 2298

    Privilege separation of data sharing scheme using attribute-based encryption by Hui ZHU, Wan LEI, Rong HUANG, Hui LI, Xi-meng LIU

    Published 2014-11-01
    “…Attribute-based encryption (ABE),which can provide fine-grained access control and flexible one-to-many encryption,has been envisioned as an important data sharing approach to achieve privacy preserving in the distributed environment.However,the flourish of the data sharing approach using attribute-based encryption still hinges upon how to fully understand and manage the challenges facing in the distributed environment,especially the veracity of the data.In fact,all of the existing data sharing schemes allow data owner to modify data without restrictions,in which the veracity of the data has been questioned and that cannot satisfy the demands of practical application sometimes,such as personal electronic medical records or assessment systems.A data sharing scheme with privilege separation is presented,in which the veracity of the data can be ensured and the flexible access control can be provided.Based on RSA-based proxy encryption,a new efficient privilege separation mechanism is introduced to ensure the veracity of the data; exploiting attribute-based encryption,the data owner can define the access policy to achieve fine-grained access control.Detailed security analysis shows that the proposed data sharing scheme can provide the data confidentiality to achieve privacy preserving.In addition,the performance analysis demonstrates the scheme’s effectiveness in terms of the computation costs.…”
    Get full text
    Article
  19. 2299
  20. 2300