Results 161 to 170 of about 407,192 (292)
Certificateless aggregate signcryption scheme with multi-ciphertext equality test for the internet of vehicles. [PDF]
Yang X, Luo X, Liu R, Li S, Yao K.
europepmc +1 more source
ABSTRACT Objective Prognostication of disease course and prediction of treatment response in multiple sclerosis is an unmet need. We compared the performance of serum neurofilament light chain Z scores (age‐ and BMI‐adjusted) with absolute concentrations for the prediction of response to disease‐modifying therapy.
Maximilian Einsiedler+43 more
wiley +1 more source
Fully secure and hierarchical identity based signature for automatic dependent surveillance broadcast systems. [PDF]
Yu Q.
europepmc +1 more source
ABSTRACT Objectives Repetitive transcranial magnetic stimulation (rTMS) is a non‐invasive brain stimulation strategy with a demonstrated potential to reinforce the residual pathways after a spinal cord injury (SCI). A preclinically tested high‐frequency (15 Hz) rTMS (15 Hz rTMS) protocol was shown to induce corticospinal tract axon regeneration growth ...
Nabila Brihmat+8 more
wiley +1 more source
Post-Quantum Linkable Hash-Based Ring Signature Scheme for Off-Chain Payments in IoT. [PDF]
He L, Zhou X, Cai D, Hu X, Liu S.
europepmc +1 more source
On the Application of Identity-Based Cryptography in Grid Security
This thesis examines the application of identity-based cryptography (IBC) in designing security infrastructures for grid applications. In this thesis, we propose a fully identity-based key infrastructure for grid (IKIG). Our proposal exploits some interesting properties of hierarchical identity-based cryptography (HIBC) to replicate security services ...
openaire +1 more source
ABSTRACT Objective To investigate the overall use of prescription medications among individuals with multiple sclerosis compared to the general population, with a focus on treatments beyond disease‐modifying therapies. Methods We conducted a nationwide, registry‐based study in Denmark.
Josefine Windfeld‐Mathiasen+4 more
wiley +1 more source
Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography)
Xavier Boyen
semanticscholar +1 more source
ICU‐EEG Pattern Detection by a Convolutional Neural Network
ABSTRACT Objective Patients in the intensive care unit (ICU) often require continuous EEG (cEEG) monitoring due to the high risk of seizures and rhythmic and periodic patterns (RPPs). However, interpreting cEEG in real time is resource‐intensive and heavily relies on specialized expertise, which is not always available.
Giulio Degano+5 more
wiley +1 more source