Results 211 to 220 of about 42,947 (261)
SNUPN‐Related Muscular Dystrophy: Novel Phenotypic, Pathological and Functional Protein Insights
ABSTRACT Objective SNUPN‐related muscular dystrophy or LGMDR29 is a new entity that covers from a congenital or childhood onset pure muscular dystrophy to more complex phenotypes combining neurodevelopmental features, cataracts, or spinocerebellar ataxia. So far, 12 different variants have been described.
Nuria Muelas +18 more
wiley +1 more source
ABSTRACT Introduction Neuronal pentraxin 2 (NPTX2) is a synaptic protein involved in synaptic plasticity and regulation of neuronal excitability. Lower baseline cerebrospinal fluid (CSF) NPTX2 levels have been shown to be associated with an earlier onset of mild cognitive impairment (MCI), a pre‐dementia syndrome, even after CSF Alzheimer's Disease (AD)
Juan P. Vazquez +12 more
wiley +1 more source
Amyotrophic Lateral Sclerosis Prevalence Projection in 2040: A Less Rare Disease
ABSTRACT Objective To project ALS prevalence across multiple countries through 2040, accounting for both population aging and increased survival. Methods Data from the Piemonte and Valle d'Aosta ALS register (PARALS) was used to estimate the trends in incidence and prevalence from 2005 to 2019. Survival trends over this period were also assessed.
Rosario Vasta +18 more
wiley +1 more source
As many patients with inflammatory arthritis (IA) have chronic pain, understanding how to best assess and manage pain in IA is a priority. Comorbid depression is prevalent in adults with IA, affecting 15% to 39% of people. Although pain and depression are thought to be associated in IA, this concept is largely based on cross‐sectional data.
Natasha Cox +3 more
wiley +1 more source
Objective Systemic sclerosis (SSc) is a rare autoimmune disease characterized by tissue fibrosis, vasculopathy, and immune dysregulation. Our objectives were to quantify the overall and site‐specific cancer risks in patients with SSc compared to the general population, examine temporal trends in cancer incidence following SSc diagnosis, and explore ...
Jihyun Na +4 more
wiley +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
IBM Journal of Research and Development, 1987
This paper is concerned with two aspects of cryptography in which the author has been working. One is the Data Encryption Standard (DES), developed at IBM and now in wide use for commercial cryptographic applications. This is a ``private key'' system; the communicants share a secret key, and the eavesdropper will succeed if he can guess this key among ...
openaire +3 more sources
This paper is concerned with two aspects of cryptography in which the author has been working. One is the Data Encryption Standard (DES), developed at IBM and now in wide use for commercial cryptographic applications. This is a ``private key'' system; the communicants share a secret key, and the eavesdropper will succeed if he can guess this key among ...
openaire +3 more sources
SIAM Journal on Computing, 1991
The property of nonmalleability for the encryption function \(E\) is a stronger extension of the classic notion of semantic security that was introduced by Goldwasser and Micali. This property is defined as follows. For all polynomial-time computable relations \(R\) seeing \(\alpha\in E(x)\) does not help one to find \(\beta\in E(y)\), \(\beta\neq ...
Cynthia Dwork, Danny Dolev, Moni Naor
openaire +4 more sources
The property of nonmalleability for the encryption function \(E\) is a stronger extension of the classic notion of semantic security that was introduced by Goldwasser and Micali. This property is defined as follows. For all polynomial-time computable relations \(R\) seeing \(\alpha\in E(x)\) does not help one to find \(\beta\in E(y)\), \(\beta\neq ...
Cynthia Dwork, Danny Dolev, Moni Naor
openaire +4 more sources
2007
One of the main methods of security is cryptography encrypting data so that only a person with the right key can decrypt it and make sense of the data. There are many forms of encryption, some more effective than others. Cryptography works by taking the original information and converting it with cipher text, which encrypts the information to an ...
Kevin Curran, Niall Smyth, Bryan McGrory
openaire +1 more source
One of the main methods of security is cryptography encrypting data so that only a person with the right key can decrypt it and make sense of the data. There are many forms of encryption, some more effective than others. Cryptography works by taking the original information and converting it with cipher text, which encrypts the information to an ...
Kevin Curran, Niall Smyth, Bryan McGrory
openaire +1 more source
2004
The emphasis and increased awareness of information security require an understanding and knowledge of the technology that supports it. As the risks and complexity of security keep growing along with the development of the Internet and e-commerce, securing information has become of utmost importance. With the worries about cyber-terrorism, hackers, and
Leslie Leong, Andrzej T. Jarmoszko
openaire +1 more source
The emphasis and increased awareness of information security require an understanding and knowledge of the technology that supports it. As the risks and complexity of security keep growing along with the development of the Internet and e-commerce, securing information has become of utmost importance. With the worries about cyber-terrorism, hackers, and
Leslie Leong, Andrzej T. Jarmoszko
openaire +1 more source
European Transactions on Telecommunications, 1994
AbstractIn the traditional scenario in cryptography there is one sender, one receiver and an active or passive eavesdropper who is an opponent. Large bank transactions require two people to sign, implying two senders. So the power to generate a valid transaction is shared.
openaire +1 more source
AbstractIn the traditional scenario in cryptography there is one sender, one receiver and an active or passive eavesdropper who is an opponent. Large bank transactions require two people to sign, implying two senders. So the power to generate a valid transaction is shared.
openaire +1 more source

