Results 51 to 60 of about 1,436,143 (281)

The symmetric signature

open access: yes, 2016
We define two related invariants for a $d$-dimensional local ring $(R,\mathfrak{m},k)$ called syzygy and differential symmetric signature by looking at the maximal free splitting of reflexive symmetric powers of two modules: the top dimensional syzygy ...
Brenner, Holger, Caminata, Alessio
core   +1 more source

The Role of Invasive Procedures in the Treatment of Complicated Gastrointestinal Graft‐Versus‐Host Disease in Pediatric Patients

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Gastrointestinal graft‐versus‐host disease (GI GVHD) following hematopoietic stem cell transplant is typically managed with medical therapy, but surgery and angioembolization may be warranted in selected cases with life‐threatening complications.
Gaia Brunetti   +12 more
wiley   +1 more source

Privacy Preservation Authentication: Group Secret Handshake with Multiple Groups

open access: yesMathematics, 2023
The technique of group secret handshake (GSH) has been used to help the members affiliated with the same group in achieving private authentication. After executing GSH protocols, the participants affiliated with the group can compute a shared secret key,
Dong Han   +4 more
doaj   +1 more source

Differential equations and conformal structures

open access: yes, 2006
We provide five examples of conformal geometries which are naturally associated with ordinary differential equations (ODEs). The first example describes a one-to-one correspondence between the Wuenschmann class of 3rd order ODEs considered modulo contact
Cartan   +22 more
core   +1 more source

Efficacy and Safety Analysis of Roxarestat in Regulating Renal Anemia in Patients on Maintenance Hemodialysis

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Objective To compare the efficacy and safety of roxarestat versus recombinant human erythropoietin (rhEPO) in the management of renal anemia in patients undergoing maintenance hemodialysis. Methods This was a prospective, open‐label, randomized controlled trial.
Lingling Chen, Junjie Zhu, Qiaonan Ge
wiley   +1 more source

Two-Round Multi-Signatures from Okamoto Signatures

open access: yesMathematics, 2023
Multi-signatures (MS) are a special type of public-key signature (PKS) in which multiple signers participate cooperatively to generate a signature for a single message. Recently, applications that use an MS scheme to strengthen the security of blockchain
Kwangsu Lee, Hyoseung Kim
doaj   +1 more source

An Identity-Based Group Signature with Membership Revocation in the Standard Model [PDF]

open access: yes, 2010
Group signatures allow group members to sign an arbitrary number\ud of messages on behalf of the group without revealing their\ud identity. Under certain circumstances the group manager holding a\ud tracing key can reveal the identity of the signer from ...
Hartel, Pieter   +3 more
core   +3 more sources

Group Signature Schemes Using Braid Groups

open access: yes, 2006
Artin's braid groups have been recently suggested as a new source for public-key cryptography. In this paper we propose the first group signature schemes based on the conjugacy problem, decomposition problem and root problem in the braid groups which are believed to be hard problems.
Thomas, Tony, Lal, Arbind Kumar
openaire   +2 more sources

Effects of the Fluid Replacement Method During Online Hemodiafiltration on the Solute Removal Performance and Biocompatibility Using the Asymmetric Cellulose Triacetate Membrane

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Introduction Pre‐dilution online hemodiafiltration (Pre‐HDF) is predominantly used in Japan, whereas post‐dilution online HDF (Post‐HDF) is more common in Europe. An asymmetric cellulose triacetate (ATA) membrane may improve biocompatibility.
Kenji Sakurai   +4 more
wiley   +1 more source

Anonymous and Traceable: A Dynamic Group Signature-Based Cross-Domain Authentication for IIoT

open access: yesMathematics
As the Internet of Things (IoT) continues to evolve, the demand for cross-domain collaboration between devices and data sharing has grown significantly. Operations confined to a single trust domain can no longer satisfy this requirement, so cross-domain ...
Cunle Deng, Chushan Zhang, Qiaodan Tan
doaj   +1 more source

Home - About - Disclaimer - Privacy