Results 261 to 270 of about 963,035 (329)
On the Maximum Toroidal Distance Code for Lattice-Based Public-Key Cryptography
Shuiyin Liu, Amin Sakzad
openalex +1 more source
ABSTRACT Background Accessing brain magnetic resonance imaging (MRI) can be challenging, especially for underserved patients, which may lead to disparities in neurological diagnosis. Method This mixed‐methods study enrolled adults with one of four neurological disorders: mild cognitive impairment or dementia of the Alzheimer type, multiple sclerosis ...
Maya L. Mastick +19 more
wiley +1 more source
Secure edge-based IoMT framework for ICU monitoring with TinyML and post-quantum cryptography. [PDF]
Khan UH +5 more
europepmc +1 more source
Code-based Cryptography: Attacking and Constructing Cryptographic Systems
This thesis discusses novel results in the area of code-based cryptography, ranging from cryptanalyses on several code-based cryptographic constructions to proposing a code-based authentication scheme based on a novel Syndrome Decoding variant.To address the looming threat of large-scale quantum computers that wouldbreak many widely-used public-key ...
openaire +1 more source
We report the national burden of dermatopolymyositis mortality over the past quarter century using the US national vital statistics data. Age‐standardized mortality rates for dermatopolymyositis decreased at an annual rate of 3.8% each year, which was higher than the annual percent decrease for deaths from all other causes.
Elizabeth Matz, Ram R. Singh
wiley +1 more source
NFBC: an efficient FPGA based NFSR-oriented lightweight block cipher suitable for embedded system. [PDF]
Chatterjee R, Chakraborty R.
europepmc +1 more source
BloomSec: Scalable and privacy-preserving searchable encryption for cloud environments. [PDF]
Khan AN +5 more
europepmc +1 more source
Provably lightweight and secure IoHT scheme with post-quantum cryptography and fog computing: A comprehensive scheme for healthcare system. [PDF]
Abood EW +4 more
europepmc +1 more source
Security of cryptographic protocols based on coding theory
Hervé Talé Kalachi
openalex +1 more source

