Results 61 to 70 of about 16,583 (248)
A Lightweight Decentralized Medical Data Sharing Scheme with Dual Verification
The rapid growth of smart healthcare improves medical efficiency through electronic data sharing but introduces security risks like privacy leaks and data tampering.
Shaobo Zhang +3 more
doaj +1 more source
Bioprosthetic aortic valves have revolutionized the treatment of aortic stenosis, but their durability is limited by structural valve deterioration (SVD). This review focuses on the pericardial tissue at the heart of these valves, examining how its mechanical properties and calcification drive fatigue and failure.
Gabriele Greco +7 more
wiley +1 more source
A New Cryptosystem Based On Hidden Order Groups [PDF]
Let $G_1$ be a cyclic multiplicative group of order $n$. It is known that the Diffie-Hellman problem is random self-reducible in $G_1$ with respect to a fixed generator $g$ if $\phi(n)$ is known. That is, given $g, g^x\in G_1$ and having oracle access to
Saxena, Amitabh, Soh, Ben
core +2 more sources
Interphase chemistry governs the stability of multivalent metal batteries. We summarize state‐of‐the‐art developments in calcium and magnesium metal batteries by focusing on the correlation among electrolytes, interphase layers, and the electrochemical performance of corresponding metal anodes.
Huijun Lin +4 more
wiley +1 more source
Error Amplification in Code-based Cryptography
Code-based cryptography is one of the main techniques enabling cryptographic primitives in a post-quantum scenario. In particular, the MDPC scheme is a basic scheme from which many other schemes have been derived. These schemes rely on iterative decoding
Alexander Nilsson +2 more
doaj +1 more source
Adaptive authentication and key agreement mechanism for future cellular systems [PDF]
Since the radio medium can be accessed by anyone, authentication of users is a very important element of a mobile network. Nowadays, in GSM/GPRS a challenge response protocol is used to authenticate the user to the mobile network.
Dimitriou, T., Komninos, N.
core
Decryption Failure Attacks on Post-Quantum Cryptography
This dissertation discusses mainly new cryptanalytical results related to issues of securely implementing the next generation of asymmetric cryptography, or Public-Key Cryptography (PKC).PKC, as it has been deployed until today, depends heavily on the integer factorization and the discrete logarithm problems.Unfortunately, it has been well-known since ...
openaire +1 more source
Computational Modeling Meets 3D Bioprinting: Emerging Synergies in Cardiovascular Disease Modeling
Emerging advances in three‐dimensional bioprinting and computational modeling are reshaping cardiovascular (CV) research by enabling more realistic, patient‐specific tissue platforms. This review surveys cutting‐edge approaches that merge biomimetic CV constructs with computational simulations to overcome the limitations of traditional models, improve ...
Tanmay Mukherjee +7 more
wiley +1 more source
As UWSN have received attention, a need for an efficient and secure communication protocol has arisen to overcome the low device performance, node failure, and high propagation latency.
Donghyun Yu, Sinwoong Yun, Jemin Lee
doaj +1 more source
SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS [PDF]
The number of security attacks against network is increasing dramatically with time. To protect the model against these attacks; techniques like passwords, cryptography, and biometrics are used.
M. L. SINGH, AJAY KAKKAR, P. K. BANSAL
doaj

