Results 51 to 60 of about 1,436,143 (281)
We define two related invariants for a $d$-dimensional local ring $(R,\mathfrak{m},k)$ called syzygy and differential symmetric signature by looking at the maximal free splitting of reflexive symmetric powers of two modules: the top dimensional syzygy ...
Brenner, Holger, Caminata, Alessio
core +1 more source
ABSTRACT Background Gastrointestinal graft‐versus‐host disease (GI GVHD) following hematopoietic stem cell transplant is typically managed with medical therapy, but surgery and angioembolization may be warranted in selected cases with life‐threatening complications.
Gaia Brunetti +12 more
wiley +1 more source
Privacy Preservation Authentication: Group Secret Handshake with Multiple Groups
The technique of group secret handshake (GSH) has been used to help the members affiliated with the same group in achieving private authentication. After executing GSH protocols, the participants affiliated with the group can compute a shared secret key,
Dong Han +4 more
doaj +1 more source
Differential equations and conformal structures
We provide five examples of conformal geometries which are naturally associated with ordinary differential equations (ODEs). The first example describes a one-to-one correspondence between the Wuenschmann class of 3rd order ODEs considered modulo contact
Cartan +22 more
core +1 more source
ABSTRACT Objective To compare the efficacy and safety of roxarestat versus recombinant human erythropoietin (rhEPO) in the management of renal anemia in patients undergoing maintenance hemodialysis. Methods This was a prospective, open‐label, randomized controlled trial.
Lingling Chen, Junjie Zhu, Qiaonan Ge
wiley +1 more source
Two-Round Multi-Signatures from Okamoto Signatures
Multi-signatures (MS) are a special type of public-key signature (PKS) in which multiple signers participate cooperatively to generate a signature for a single message. Recently, applications that use an MS scheme to strengthen the security of blockchain
Kwangsu Lee, Hyoseung Kim
doaj +1 more source
An Identity-Based Group Signature with Membership Revocation in the Standard Model [PDF]
Group signatures allow group members to sign an arbitrary number\ud of messages on behalf of the group without revealing their\ud identity. Under certain circumstances the group manager holding a\ud tracing key can reveal the identity of the signer from ...
Hartel, Pieter +3 more
core +3 more sources
Group Signature Schemes Using Braid Groups
Artin's braid groups have been recently suggested as a new source for public-key cryptography. In this paper we propose the first group signature schemes based on the conjugacy problem, decomposition problem and root problem in the braid groups which are believed to be hard problems.
Thomas, Tony, Lal, Arbind Kumar
openaire +2 more sources
ABSTRACT Introduction Pre‐dilution online hemodiafiltration (Pre‐HDF) is predominantly used in Japan, whereas post‐dilution online HDF (Post‐HDF) is more common in Europe. An asymmetric cellulose triacetate (ATA) membrane may improve biocompatibility.
Kenji Sakurai +4 more
wiley +1 more source
Anonymous and Traceable: A Dynamic Group Signature-Based Cross-Domain Authentication for IIoT
As the Internet of Things (IoT) continues to evolve, the demand for cross-domain collaboration between devices and data sharing has grown significantly. Operations confined to a single trust domain can no longer satisfy this requirement, so cross-domain ...
Cunle Deng, Chushan Zhang, Qiaodan Tan
doaj +1 more source

