Results 51 to 60 of about 58,711 (310)
Cross-domain authentication scheme based on consortium blockchain
To solve the security problems of traditional cross-domain authentication schemes, such as single point of failure and excessive dependence on third parties, a cross-domain authentication scheme was proposed which combines IBC and consortium blockchain ...
Jianlin NIU, Zhiyu REN, Xuehui DU
doaj +3 more sources
Fare non-repudiation protocol based on identity-based cryptography
A signature scheme with the one-off blind public key was proposed based on identity-based cryptography,and thus was applied in a new fare non-repudiation protocol.In this protocol,the sender was anonymity,so avoid that the recipient deliberately rejected
LIU Hong-wei +3 more
doaj +2 more sources
ABSTRACT Background/Objectives Osteosarcoma is a radioresistant tumor that may benefit from stereotactic body radiation therapy (SBRT) for locoregional control in metastatic/recurrent disease. We report institutional practice patterns, outcomes, toxicity, and failures in osteosarcoma patients treated with SBRT.
Jenna Kocsis +13 more
wiley +1 more source
Efficient Extended Chaotic Map-Based IBE for Industrial Environment
Identity-based encryption is a public key-based method of encryption that enables communicating identities to use some individual and unique information, such as their physical IP addresses and MAC addresses, to identify them and as public keys.
Tian-Fu Lee, Yi-Chien Huang
doaj +1 more source
ABSTRACT Background Despite their increased risk for functional impairment resulting from cancer and its treatments, few adolescents and young adults (AYAs) with a hematological malignancy receive the recommended or therapeutic dose of exercise per week during inpatient hospitalizations.
Jennifer A. Kelleher +8 more
wiley +1 more source
An efficient certificateless blind signature scheme without bilinear pairing
Recently, the certificateless public key cryptography (CLPKC) has been studied widely since it could solve both of the certificate management problem in traditional public key cryptography (TPKC) and the key escrow problem in the identity-based public ...
GUOFAGN DONG +3 more
doaj +1 more source
Securing Topology Control in SDWSNs Using Identity‐Based Cryptography
In software‐defined wireless sensor networks (SDWSNs), topology control is a fundamental procedure to maintain the global network topology. However, the open wireless channels of SDWSNs make it possible for an attacker to eavesdrop, replay, or modify the topology messages, thus posing a great threat to the network operations.
Rui Wang +10 more
openaire +1 more source
Differential Power Analysis against the Miller Algorithm [PDF]
Article en cours de publicationPairings permit several protocol simplications and original scheme creation, for example Identity Based Cryptography protocols.
Bajard, Jean-Claude +4 more
core
ABSTRACT Background Psychological safety (PS) is essential for teamwork, communication, and patient safety in complex healthcare environments. In pediatric oncology, interprofessional collaboration occurs under high emotional and organizational demands. Low PS may increase stress, burnout, and adverse events.
Alexandros Rahn +4 more
wiley +1 more source
Developmental Disorders in Children Recently Diagnosed With Cancer
ABSTRACT Neurocognitive deficits in adult survivors of childhood cancer are well established, but less is known about developmental disorders (DD) arising shortly after cancer diagnosis. Using 2016–2019 linked Ohio cancer registry and Medicaid data, we compared DD among 324 children with cancer and 606,913 cancer‐free controls.
Jamie Shoag +5 more
wiley +1 more source

