Results 61 to 70 of about 16,583 (248)

A Lightweight Decentralized Medical Data Sharing Scheme with Dual Verification

open access: yesCryptography
The rapid growth of smart healthcare improves medical efficiency through electronic data sharing but introduces security risks like privacy leaks and data tampering.
Shaobo Zhang   +3 more
doaj   +1 more source

From Clinic to Computation: Multiscale Bioengineering Strategies for Durable Biological Aortic Valve Replacements

open access: yesAdvanced Functional Materials, EarlyView.
Bioprosthetic aortic valves have revolutionized the treatment of aortic stenosis, but their durability is limited by structural valve deterioration (SVD). This review focuses on the pericardial tissue at the heart of these valves, examining how its mechanical properties and calcification drive fatigue and failure.
Gabriele Greco   +7 more
wiley   +1 more source

A New Cryptosystem Based On Hidden Order Groups [PDF]

open access: yes, 2006
Let $G_1$ be a cyclic multiplicative group of order $n$. It is known that the Diffie-Hellman problem is random self-reducible in $G_1$ with respect to a fixed generator $g$ if $\phi(n)$ is known. That is, given $g, g^x\in G_1$ and having oracle access to
Saxena, Amitabh, Soh, Ben
core   +2 more sources

Toward Stable Multivalent Metal Batteries: Understanding the Interfacial Chemistry for Magnesium and Calcium Metal Anodes

open access: yesAdvanced Functional Materials, EarlyView.
Interphase chemistry governs the stability of multivalent metal batteries. We summarize state‐of‐the‐art developments in calcium and magnesium metal batteries by focusing on the correlation among electrolytes, interphase layers, and the electrochemical performance of corresponding metal anodes.
Huijun Lin   +4 more
wiley   +1 more source

Error Amplification in Code-based Cryptography

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Code-based cryptography is one of the main techniques enabling cryptographic primitives in a post-quantum scenario. In particular, the MDPC scheme is a basic scheme from which many other schemes have been derived. These schemes rely on iterative decoding
Alexander Nilsson   +2 more
doaj   +1 more source

Adaptive authentication and key agreement mechanism for future cellular systems [PDF]

open access: yes, 2006
Since the radio medium can be accessed by anyone, authentication of users is a very important element of a mobile network. Nowadays, in GSM/GPRS a challenge response protocol is used to authenticate the user to the mobile network.
Dimitriou, T., Komninos, N.
core  

Decryption Failure Attacks on Post-Quantum Cryptography

open access: yes, 2023
This dissertation discusses mainly new cryptanalytical results related to issues of securely implementing the next generation of asymmetric cryptography, or Public-Key Cryptography (PKC).PKC, as it has been deployed until today, depends heavily on the integer factorization and the discrete logarithm problems.Unfortunately, it has been well-known since ...
openaire   +1 more source

Computational Modeling Meets 3D Bioprinting: Emerging Synergies in Cardiovascular Disease Modeling

open access: yesAdvanced Healthcare Materials, EarlyView.
Emerging advances in three‐dimensional bioprinting and computational modeling are reshaping cardiovascular (CV) research by enabling more realistic, patient‐specific tissue platforms. This review surveys cutting‐edge approaches that merge biomimetic CV constructs with computational simulations to overcome the limitations of traditional models, improve ...
Tanmay Mukherjee   +7 more
wiley   +1 more source

Secure and efficient communications with fine-grained access control in underwater wireless sensor networks

open access: yesICT Express
As UWSN have received attention, a need for an efficient and secure communication protocol has arisen to overcome the low device performance, node failure, and high propagation latency.
Donghyun Yu, Sinwoong Yun, Jemin Lee
doaj   +1 more source

SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS [PDF]

open access: yesJournal of Engineering Science and Technology, 2012
The number of security attacks against network is increasing dramatically with time. To protect the model against these attacks; techniques like passwords, cryptography, and biometrics are used.
M. L. SINGH, AJAY KAKKAR, P. K. BANSAL
doaj  

Home - About - Disclaimer - Privacy