Results 301 to 310 of about 235,449 (333)

Management and Outcomes in Confirmed or Suspected Acute Symptomatic Seizure: Role of Structured Outpatient Care

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Post‐discharge management and outcomes of acute symptomatic seizures (ASyS) remain underexplored. We analyzed post‐discharge ASM management and outcomes in ASyS patients undergoing continuous EEG (cEEG), including the role of outpatient care through a post‐acute symptomatic seizure (PASS) clinic. Methods We performed a single‐center,
Vineet Punia   +10 more
wiley   +1 more source

A robust audio steganography technique based on image encryption using different chaotic maps. [PDF]

open access: yesSci Rep
Nasr MA   +6 more
europepmc   +1 more source

Intelligent two-phase dual authentication framework for Internet of Medical Things. [PDF]

open access: yesSci Rep
Asif M   +6 more
europepmc   +1 more source

A novel Chua's based 2-D chaotic system and its performance analysis in cryptography. [PDF]

open access: yesPLoS One
Rasappan S   +5 more
europepmc   +1 more source

Cryptography

2007
One of the main methods of security is cryptography encrypting data so that only a person with the right key can decrypt it and make sense of the data. There are many forms of encryption, some more effective than others. Cryptography works by taking the original information and converting it with cipher text, which encrypts the information to an ...
Kevin Curran, Niall Smyth, Bryan McGrory
openaire   +1 more source

Threshold Cryptography

European Transactions on Telecommunications, 1994
AbstractIn the traditional scenario in cryptography there is one sender, one receiver and an active or passive eavesdropper who is an opponent. Large bank transactions require two people to sign, implying two senders. So the power to generate a valid transaction is shared.
openaire   +1 more source

Cryptography

2004
The emphasis and increased awareness of information security require an understanding and knowledge of the technology that supports it. As the risks and complexity of security keep growing along with the development of the Internet and e-commerce, securing information has become of utmost importance. With the worries about cyber-terrorism, hackers, and
Leslie Leong, Andrzej T. Jarmoszko
openaire   +1 more source

Home - About - Disclaimer - Privacy