Results 211 to 220 of about 44,786 (250)

Development of a Personalized Visualization and Analysis Tool to Improve Clinical Care in Complex Multisystem Diseases With Application to Scleroderma

open access: yesArthritis Care &Research, EarlyView.
Objective In complex diseases, it is challenging to assess a patient's disease state, trajectory, treatment exposures, and risk of multiple outcomes simultaneously, efficiently, and at the point of care. Methods We developed an interactive patient‐level data visualization and analysis tool (VAT) that automates illustration of the trajectory of a ...
Ji Soo Kim   +18 more
wiley   +1 more source

Lived and Care Experiences of Chronic Musculoskeletal Shoulder Pain in Australian Adults: A Qualitative Study

open access: yesArthritis Care &Research, EarlyView.
Objective Australian evidence on lived and care experiences of chronic musculoskeletal shoulder pain (CMSP), irrespective of disorder classification or disease, is limited. However, such evidence is important for person‐centered care and informing local service pathways and care guidelines or standards.
Sonia Ranelli   +8 more
wiley   +1 more source

Hydroxychloroquine Associated With Lower Glomerular Filtration Rate Decline in Lupus Nephritis

open access: yesArthritis Care &Research, EarlyView.
Objective Hydroxychloroquine (HCQ) protects kidney function in lupus nephritis (LN) by preventing flares, yet some cohort studies show no significant benefit in kidney function with HCQ. Clarifying these conflicting findings by showing early and long‐term benefits of HCQ on kidney function preservation is critical.
Shivani Garg   +9 more
wiley   +1 more source

Nonmalleable Cryptography

SIAM Journal on Computing, 1991
The property of nonmalleability for the encryption function \(E\) is a stronger extension of the classic notion of semantic security that was introduced by Goldwasser and Micali. This property is defined as follows. For all polynomial-time computable relations \(R\) seeing \(\alpha\in E(x)\) does not help one to find \(\beta\in E(y)\), \(\beta\neq ...
Dolev, Danny, Dwork, Cynthia, Naor, Moni
openaire   +2 more sources

Threshold Cryptography

European Transactions on Telecommunications, 1994
AbstractIn the traditional scenario in cryptography there is one sender, one receiver and an active or passive eavesdropper who is an opponent. Large bank transactions require two people to sign, implying two senders. So the power to generate a valid transaction is shared.
openaire   +1 more source

Cryptography

Scientific American
The science of cryptography lies at the very foundations of trust in current and future systems and devices for communication and computation. For example, secure communications over the internet today are possible thanks to mathematical work in cryptography in the 1970s and 80s.
Johannes Buchmann   +3 more
  +5 more sources

Quantum Cryptography

Foundations of Physics, 2010
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +1 more source

Cryptography

2004
The emphasis and increased awareness of information security require an understanding and knowledge of the technology that supports it. As the risks and complexity of security keep growing along with the development of the Internet and e-commerce, securing information has become of utmost importance. With the worries about cyber-terrorism, hackers, and
Leslie Leong, Andrzej T. Jarmoszko
openaire   +2 more sources

Home - About - Disclaimer - Privacy