Results 301 to 310 of about 235,449 (333)
ABSTRACT Objective Post‐discharge management and outcomes of acute symptomatic seizures (ASyS) remain underexplored. We analyzed post‐discharge ASM management and outcomes in ASyS patients undergoing continuous EEG (cEEG), including the role of outpatient care through a post‐acute symptomatic seizure (PASS) clinic. Methods We performed a single‐center,
Vineet Punia+10 more
wiley +1 more source
A certificateless aggregate signature scheme for VANETs with privacy protection properties. [PDF]
Li H, Shen C, Huang H, Wu C.
europepmc +1 more source
Optimizing data privacy and security measures for critical infrastructures via IoT based ADP2S technique. [PDF]
Xu Z+6 more
europepmc +1 more source
A robust audio steganography technique based on image encryption using different chaotic maps. [PDF]
Nasr MA+6 more
europepmc +1 more source
A survey on advancements in blockchain-enabled spectrum access security for 6G cognitive radio IoT networks. [PDF]
Al-Matari NY+2 more
europepmc +1 more source
Intelligent two-phase dual authentication framework for Internet of Medical Things. [PDF]
Asif M+6 more
europepmc +1 more source
A novel Chua's based 2-D chaotic system and its performance analysis in cryptography. [PDF]
Rasappan S+5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2007
One of the main methods of security is cryptography encrypting data so that only a person with the right key can decrypt it and make sense of the data. There are many forms of encryption, some more effective than others. Cryptography works by taking the original information and converting it with cipher text, which encrypts the information to an ...
Kevin Curran, Niall Smyth, Bryan McGrory
openaire +1 more source
One of the main methods of security is cryptography encrypting data so that only a person with the right key can decrypt it and make sense of the data. There are many forms of encryption, some more effective than others. Cryptography works by taking the original information and converting it with cipher text, which encrypts the information to an ...
Kevin Curran, Niall Smyth, Bryan McGrory
openaire +1 more source
European Transactions on Telecommunications, 1994
AbstractIn the traditional scenario in cryptography there is one sender, one receiver and an active or passive eavesdropper who is an opponent. Large bank transactions require two people to sign, implying two senders. So the power to generate a valid transaction is shared.
openaire +1 more source
AbstractIn the traditional scenario in cryptography there is one sender, one receiver and an active or passive eavesdropper who is an opponent. Large bank transactions require two people to sign, implying two senders. So the power to generate a valid transaction is shared.
openaire +1 more source
2004
The emphasis and increased awareness of information security require an understanding and knowledge of the technology that supports it. As the risks and complexity of security keep growing along with the development of the Internet and e-commerce, securing information has become of utmost importance. With the worries about cyber-terrorism, hackers, and
Leslie Leong, Andrzej T. Jarmoszko
openaire +1 more source
The emphasis and increased awareness of information security require an understanding and knowledge of the technology that supports it. As the risks and complexity of security keep growing along with the development of the Internet and e-commerce, securing information has become of utmost importance. With the worries about cyber-terrorism, hackers, and
Leslie Leong, Andrzej T. Jarmoszko
openaire +1 more source