Results 91 to 100 of about 3,545,158 (344)

Quantum digital signatures with quantum-key-distribution components [PDF]

open access: yes, 2014
Digital signatures guarantee the authenticity and transferability of messages and are widely used in modern communication. The security of currently used classical digital signature schemes, however, relies on computational assumptions.
P. Wallden   +3 more
semanticscholar   +1 more source

Higher Amyloid and Tau Burden Is Associated With Faster Decline on a Digital Cognitive Test

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective A 2‐min digital clock‐drawing test (DCTclock) captures more granular features of the clock‐drawing process than the pencil‐and‐paper clock‐drawing test, revealing more subtle deficits at the preclinical stage of Alzheimer's disease (AD). A previous cross‐sectional study demonstrated that worse DCTclock performance was associated with
Jessie Fanglu Fu   +16 more
wiley   +1 more source

Dorsolateral Cervical Cord T2 Hyperintensity in KIF1C‐Related Disease (Spastic Paraplegia 58): Two Long‐Duration Cases

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Pathogenic variants in KIF1C cause Spastic Paraplegia 58 (SPG58), typically presenting with cerebellar ataxia and spastic paraparesis. We report two unrelated patients with spastic paraparesis, cerebellar ataxia, and tremor. Whole‐exome sequence analysis identified novel homozygous variants in the motor domain of KIF1C (NM_006612.6): c.921G>A (
Akihiko Mitsutake   +12 more
wiley   +1 more source

UTSig: A Persian Offline Signature Dataset

open access: yes, 2016
The pivotal role of datasets in signature verification systems motivates researchers to collect signature samples. Distinct characteristics of Persian signature demands for richer and culture-dependent offline signature datasets.
Araabi, Babak N.   +2 more
core   +1 more source

Prediction of Myasthenia Gravis Worsening: A Machine Learning Algorithm Using Wearables and Patient‐Reported Measures

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Myasthenia gravis (MG) is a rare disorder characterized by fluctuating muscle weakness with potential life‐threatening crises. Timely interventions may be delayed by limited access to care and fragmented documentation. Our objective was to develop predictive algorithms for MG deterioration using multimodal telemedicine data ...
Maike Stein   +7 more
wiley   +1 more source

Discovery and Targeted Proteomic Studies Reveal Striatal Markers Validated for Huntington's Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Clinical trials for Huntington's disease (HD) enrolling persons before clinical motor diagnosis (CMD) lack validated biomarkers. This study aimed to conduct an unbiased discovery analysis and a targeted examination of proteomic biomarkers scrutinized by clinical validation. Methods Cerebrospinal fluid was obtained from PREDICT‐HD and
Daniel Chelsky   +8 more
wiley   +1 more source

Deciphering the molecular signature of selective neuronal vulnerability in the wake‐promoting lateral hypothalamic area in Alzheimer’s disease: A digital multiplexed gene expression study across Braak stages [PDF]

open access: bronze, 2023
Abhijit Satpati   +14 more
openalex   +1 more source

Remote Monitoring in Myasthenia Gravis: Exploring Symptom Variability

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Myasthenia gravis (MG) is a rare, autoimmune disorder characterized by fluctuating muscle weakness and potential life‐threatening crises. While continuous specialized care is essential, access barriers often delay timely interventions. To address this, we developed MyaLink, a telemedical platform for MG patients.
Maike Stein   +13 more
wiley   +1 more source

Digital Signature

open access: yes, 2023
AbstractA digital signature uses cryptographic hashing functions and asymmetric cryptography to sign data. It also provides origin authentication, data integrity, and signer non-repudiation. The main idea is to generate a hash of the data using a cryptographic hashing function and then encrypt it by the signing party using its private key.
openaire   +2 more sources

Home - About - Disclaimer - Privacy