Results 41 to 50 of about 198,045 (271)
ABSTRACT Pediatric gastroenteropancreatic neuroendocrine neoplasms (GEP‐NENs) are extremely rare and clinically heterogeneous. Management has largely been extrapolated from adult practice. This European Standard Clinical Practice Guideline (ESCP), developed by the EXPeRT network in collaboration with adult NEN experts, provides (adult) evidence ...
Michaela Kuhlen +23 more
wiley +1 more source
Comments on “Certificateless Short Aggregate Signature Scheme for Mobile Devices”
In the above paper “Certificateless Short Aggregate Signature Scheme for Mobile Devices” a pairing-based certificateless aggregate signature (CLAS) scheme was proposed. Although the authors claim that their CLAS scheme is secure and provide
Je Hong Park, Bonwook Koo
doaj +1 more source
A certificateless aggregate signature scheme for security and privacy protection in VANET
In the vehicular ad hoc network, moving vehicles can keep communicating with each other by entering or leaving the network at any time to establish a new connection.
Eko Fajar Cahyadi +3 more
doaj +1 more source
Overfull: Too Large Aggregate Signatures Based on Lattices
Abstract The Fiat-Shamir with Aborts paradigm of Lyubashevsky has given rise to efficient lattice-based signature schemes. One popular implementation is Dilithium, which has been selected for standardization by the US National Institute of Standards and Technology (NIST).
Boudgoust, Katharina +1 more
openaire +3 more sources
ABSTRACT Background Oral mucositis is a common and debilitating side effect of childhood cancer and stem cell transplant treatments. It affects the quality of life of children and young people (CYP) and places a strain on services. Photobiomodulation is recommended for oral mucositis prevention in international guidance but is poorly implemented in UK ...
Claudia Heggie +4 more
wiley +1 more source
Identity-based key-insulated aggregate signature scheme
Private key exposure can be the most devastating attack on cryptographic schemes; as such exposure leads to the breakage of security of the scheme as a whole. In the real world scenario, this problem is perhaps the biggest threat to cryptography.
P. Vasudeva Reddy, P.V.S.S.N. Gopal
doaj +1 more source
Revisiting the security model for aggregate signature schemes [PDF]
Aggregate signature schemes combine the digital signatures of multiple users on different messages into one single signature. The Boneh-Gentry-Lynn-Shacham (BGLS) aggregate signature scheme is one such scheme, based on pairings, where anyone can ...
Lacharité, Marie-Sarah
core
Adaptive data synchronization algorithm for IoT-oriented low-power wide-area networks [PDF]
The Internet of Things (IoT) is by now very close to be realized, leading the world towards a new technological era where people’s lives and habits will be definitively revolutionized.
Biagi, Mauro +5 more
core +1 more source
Clinical Insights Into Hypercalcemia of Malignancy in Childhood
ABSTRACT Hypercalcemia of malignancy (HCM) is a rare but life‐threatening metabolic emergency in children that occurs in less than 1% of pediatric cancer cases, with a reported incidence ranging from 0.4% to 1.0% across different studies. While it is observed in 10%–20% of adult malignancies, pediatric HCM remains relatively uncommon.
Hüseyin Anıl Korkmaz
wiley +1 more source
Cryptanalysis of Compact Certificateless Aggregate Signature Schemes for HWMSNs and VANETs
Certificateless cryptosystems resolve the critical problems in public-key cryptosystems and identity-based cryptosystems. A certificateless aggregate signature scheme aggregates multiple signatures of multiple signers into a single signature that ...
Kyung-Ah Shim
doaj +1 more source

