Results 201 to 210 of about 23,383 (317)
Analysis and Enhancement of a Password Authentication and Update Scheme Based on Elliptic Curve Cryptography [PDF]
Lili Wang
openalex +1 more source
Objective To evaluate the relationship between tumor‐infiltrating lymphocyte (TIL) levels and multiparametric ultrasonography (US) findings combining B‐mode US, shear wave elastography (SWE), and superb microvascular imaging (SMI) in patients with invasive breast cancer, and to explore the potential of sonographic imaging modalities in predicting the ...
Yasemin Kayadibi+6 more
wiley +1 more source
Elliptic Curves and their Applications in Cryptography
Nisheeth Saxena, Preeti Sharma
openaire +2 more sources
The use of elliptic curves in cryptography
The use of elliptic curves in cryptography was suggested independently by Neal Koblitz and Victor Miller in 1985. Being a relatively new field, there is still a lot of ongoing research on the subject, but elliptic curve cryptography, or ECC for short, has already been implemented in real-life applications.
openaire +1 more source
How marine heatwaves are reshaping phytoplankton in the Northeast Pacific
Abstract In 2015 and 2019, the Northeast Pacific has undergone significant heatwave events that strongly disrupted marine ecosystems functioning and services. Here we use the data collected by the Continuous Plankton Recorder (CPR) survey to investigate the changes in summer phytoplankton abundance and morphology and show an increase in prolate (i.e ...
Loïck Kléparski+6 more
wiley +1 more source
Evaluating 16-Bit Processors for Elliptic Curve Cryptography
Erich Wenger, Mario Werner
openalex +1 more source
Dynamics of Vector Soliton Singlets and Pairs in Self‐Mode‐Locked Tm‐Doped Fibre Lasers
This study characterises soliton build‐up dynamics in a self‐mode‐locked Tm‐doped fibre laser, where both cavity birefringence and distributed saturable absorber play significant roles in the intracavity pulse shaping. The recorded single‐shot spectra using the dispersive Fourier transform technique reveal intensity‐dependent temporal splitting of ...
Dennis C. Kirsch+2 more
wiley +1 more source
An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography. [PDF]
Reddy AG, Das AK, Odelu V, Yoo KY.
europepmc +1 more source
Compact Spectral Imaging: A Review of Miniaturized and Integrated Systems
This review explores the rapid shift toward compact spectral imaging systems by examining four key design paradigms: Do‐It‐Yourself (DIY) platforms, freeform optics, filter‐on‐chip integration, and multifunctional metasurfaces. The discussion highlights critical applications in medicine, agriculture, and environmental monitoring, providing comparative ...
Sani Mukhtar, Amir Arbabi, Jaime Viegas
wiley +1 more source