Results 41 to 50 of about 85,247 (258)
Provably secure certificateless aggregate signature scheme in wireless roaming authentication
Certificateless aggregate signature (CLAS) schemes have been widely applied in resource-constrained wireless mobile networks,because they could not only realize batch validation but also solve the certificate management and key escrow problems.It was ...
Zhi-yan XU +3 more
doaj +2 more sources
Forward Secure Sequential Aggregate Signature Schemes on Lattice
The forward secure sequential aggregate (Fss-Agg) signature has the advantages of forward secure signature and the sequential aggregate signature at the same time. Since its proposal in 2007, it has been widely applied in many application scenarios, such
XIE Jia, HU Yupu, GAO Juntao, WANG Baocang, JIANG Mingming
doaj +1 more source
Intravitreal GD2‐Specific Chimeric Antigen Receptor T‐Cell Therapy for Refractory Retinoblastoma
ABSTRACT Effective treatments for advanced, treatment‐resistant retinoblastoma (RB) remain limited. GD2‐specific chimeric antigen receptor (CAR) T cells show potent antitumor activity with minimal toxicity but have not previously been evaluated in RB.
Subongkoch Subhadhirasakul +13 more
wiley +1 more source
Efficient certificate‐based aggregate signature scheme for vehicular ad hoc networks
As vehicle speed is fast and on board units' (OBUs) computing power, storage space, bandwidth and other resources are very limited, the efficiency of message transmission in vehicular ad hoc network is of great concern.
Jian‐Neng Chen +6 more
doaj +1 more source
Certificateless Aggregate Signature Scheme for Privacy Protection in VANET [PDF]
In Vehicular Ad-hoc Network(VANET),problems such as vulnerable communication data and low computational efficiency are ubiquitous.This paper proposes a certificateless aggregation signature scheme based on certificateless public key cryptosystem and ...
ZHAO Nan, ZHANG Guoan, GU Xiaohui
doaj +1 more source
Security and Privacy Issues in Wireless Mesh Networks: A Survey
This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different ...
A. Gupta +73 more
core +1 more source
ABSTRACT Background Survivors of childhood acute lymphoblastic leukemia (ALL) often exhibit early deficits in muscle and movement competence, which can compromise long‐term health. Integrative neuromuscular training (INT), a multifaceted approach combining fundamental movement activities with strength exercises, may help address these deficits during ...
Anna Maria Markarian +7 more
wiley +1 more source
Bullen's parameter as a seismic observable for spin crossovers in the lower mantle
Elastic anomalies produced by the spin crossover in ferropericlase have been documented by both first principles calculations and high pressure-temperature experiments.
Shukla, Gaurav +3 more
core +1 more source
Cryptanalysis and Improvement of Three Certificateless Aggregate Signature Schemes [PDF]
The certificateless aggregate signature (CLAS) scheme is a very important data aggregation technique that compresses a large number of signatures from different users into a short signature. CLAS can reduce the total length of a signature and the computational overhead of signature verification and is therefore highly suitable for resource-constrained ...
Xiaodong Yang +4 more
openaire +1 more source
ABSTRACT In pediatric patients, T‐cell lymphoblastic lymphoma (T‐LBL) survival exceeds 80%. Relapse remains associated with limited curative options. Frontline treatment is largely extrapolated from T‐cell acute lymphoblastic leukemia (T‐ALL) treatment, reflecting the ongoing debate, whether both entities represent distinct diseases or variants within ...
Marie C. Heider +4 more
wiley +1 more source

