Results 21 to 30 of about 71,180 (205)
Biometric identity-based cryptography for e-Government environment [PDF]
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core +1 more source
Amyotrophic Lateral Sclerosis as a Multistep Process in the United States: A Population‐Based Study
ABSTRACT Background Amyotrophic lateral sclerosis (ALS) is a fatal, progressive neurodegenerative disease that typically results in death within 3–5 years from symptom onset. However, little is known about the environmental exposures, clinical aspects, or social determinants of health factors that may be associated with the disease.
Jasmine Berry+7 more
wiley +1 more source
ABSTRACT Objectives Repetitive transcranial magnetic stimulation (rTMS) is a non‐invasive brain stimulation strategy with a demonstrated potential to reinforce the residual pathways after a spinal cord injury (SCI). A preclinically tested high‐frequency (15 Hz) rTMS (15 Hz rTMS) protocol was shown to induce corticospinal tract axon regeneration growth ...
Nabila Brihmat+8 more
wiley +1 more source
Risks and remedies in e-learning system
One of the most effective applications of Information and Communication Technology (ICT) is the emergence of E-Learning. Considering the importance and need of E-Learning, recent years have seen a drastic change of learning methodologies in Higher ...
Barik, Nikhilesh, Karforma, Sunil
core +1 more source
Objective Social determinants of health (SDoH) can impact outcomes but are not routinely screened for in US outpatient rheumatology clinics. This study determined the feasibility of routine point‐of‐care SDoH screening among patients with systemic lupus erythematosus (SLE) and associated barriers and facilitators at the physician, care team, and ...
S. Sam Lim+11 more
wiley +1 more source
Group theory in cryptography [PDF]
This paper is a guide for the pure mathematician who would like to know more about cryptography based on group theory. The paper gives a brief overview of the subject, and provides pointers to good textbooks, key research papers and recent survey papers ...
Blackburn, Simon R.+2 more
core
Quantum cryptography is a new method for secret communications offering the ultimate security assurance of the inviolability of a Law of Nature.
Bell J. S.+30 more
core +1 more source
Objectives Australian evidence on lived and care experiences of chronic musculoskeletal shoulder pain (CMSP), irrespective of disorder classification or disease, is limited. However, such evidence is important for person‐centred care and informing local service pathways and care guidelines or standards.
Sonia Ranelli+8 more
wiley +1 more source
Insecurity of Quantum Secure Computations
It had been widely claimed that quantum mechanics can protect private information during public decision in for example the so-called two-party secure computation.
A. C.-C. Yao+25 more
core +3 more sources
Objectives There is growing interest in evaluating new strategies to delay or prevent post‐traumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury.
Kevin Kennedy+9 more
wiley +1 more source