Secure multiparty computations without computers
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Ari Renvall, Valtteri Niemi
openaire +3 more sources
Pericytes change function depending on glioblastoma vicinity: emphasis on immune regulation
Pericytes alter their transcriptome depending on their proximity to the tumor core. In the tumor core, pericytes display a more active state with higher communication strength but with lower immune activation potential and a shift toward extracellular matrix production.
Carolina Buizza+5 more
wiley +1 more source
Manet: motion-aware network for video action recognition
Video action recognition is a fundamental task in video understanding. Actions in videos may vary at different speeds or scales, and it is difficult to cope with a wide variety of actions by relying on a single spatio-temporal scale to extract features ...
Xiaoyang Li+4 more
doaj +1 more source
Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts+8 more
wiley +1 more source
Low-cost data partitioning and encrypted backup scheme for defending against co-resident attacks
Aiming at preventing user data leakage and the damage that is caused by co-resident attacks in the cloud environment, a data partitioning and encryption backup (P&XE) scheme is proposed.
Junfeng Tian, Zilong Wang, Zhen Li
doaj +1 more source
When Is a Function Securely Computable? [PDF]
A subset of a set of terminals that observe correlated signals seek to compute a given function of the signals using public communication. It is required that the value of the function be kept secret from an eavesdropper with access to the communication. We show that the function is securely computable if and only if its entropy is less than the "aided
Himanshu Tyagi+2 more
openaire +4 more sources
Earthing effects on mitochondrial function: ATP production and ROS generation
In contrast to sham and naive controls, grounded mitochondria not only exhibit significantly enhanced energy production but also demonstrate a remarkable reduction in membrane potential and oxidative stress. This suggests a profound improvement in mitochondrial health, presenting a promising avenue for therapeutic interventions.
Cecilia Giulivi, Richard Kotz
wiley +1 more source
Cloud EMRs auditing with decentralized (t, n)-threshold ownership transfer
In certain cloud Electronic Medical Records (EMRs) applications, the data ownership may need to be transferred. In practice, not only the data but also the auditing ability should be transferred securely and efficiently.
Yamei Wang+4 more
doaj +1 more source
Les chercheurs face à la surveillance d’État : état des lieux et contre-mesures
Since the 2013 disclosures of whistleblower Edward Snowden on the surveillance practices of Western intelligence agencies, the exposure of the field of social science to state surveillance – implemented by judiciary and police authorities, and more ...
Félix Tréguer, Camille Noûs
doaj +1 more source
Hierarchical Quantum Information Splitting of an Arbitrary Two-Qubit State Based on a Decision Tree
Quantum informatics is a new subject formed by the intersection of quantum mechanics and informatics. Quantum communication is a new way to transmit quantum states through quantum entanglement, quantum teleportation, and quantum information splitting ...
Dongfen Li+6 more
doaj +1 more source