On the Application of Identity-Based Cryptography in Grid Security
Hoon Wei Lim
openalex +1 more source
Achieving Identity-Based Cryptography in a Personal Digital Assistant Device
L. Martínez-Ramos +2 more
openalex +2 more sources
Use of Symptomatic Drug Treatment for Fatigue in Multiple Sclerosis and Patterns of Work Loss
ABSTRACT Objective To describe the use of central stimulants and amantadine for fatigue in MS and evaluate a potential association with reduced work loss in people with MS. Methods We conducted a nationwide, matched, register‐based cohort study in Sweden (2006 to 2023) using national registers with prospective data collection.
Simon Englund +3 more
wiley +1 more source
A lightweight and secure authentication and privacy protection scheme for internet of medical things. [PDF]
Kumar S, Abhishek K, Selvarajan S.
europepmc +1 more source
Secure Session Framework: An Identity-based Cryptographic Key Agreement and Signature Protocol
Christian Schridde
openalex +1 more source
Age‐Related Characteristics of SYT1‐Associated Neurodevelopmental Disorder
ABSTRACT Objectives We describe the clinical manifestations and developmental abilities of individuals with SYT1‐associated neurodevelopmental disorder (Baker‐Gordon syndrome) from infancy to adulthood. We further describe the neuroradiological and electrophysiological characteristics of the condition at different ages, and explore the associations ...
Sam G. Norwitz +3 more
wiley +1 more source
A secure data sharing scheme based on broadcast signcryption in data center. [PDF]
Dong R, Li Y, Zhu L.
europepmc +1 more source
Hospital Readmission After Traumatic Brain Injury Hospitalization in Community‐Dwelling Older Adults
ABSTRACT Objective To examine the risk of hospital readmission after an index hospitalization for TBI in older adults. Methods Using data from the Atherosclerosis Risk in Communities (ARIC) study, we used propensity score matching of individuals with an index TBI‐related hospitalization to individuals with (1) non‐TBI hospitalizations (primary analysis)
Rachel Thomas +7 more
wiley +1 more source
A Lightweight Key Agreement Protocol for V2X Communications Based on Kyber and Saber. [PDF]
Dai Y, Wang Q, Song X, Wang S.
europepmc +1 more source
Evaluation of Cryptography Algorithm Based on Digital Identity Authentication
Liang Zhang +3 more
openalex +1 more source

