Results 51 to 60 of about 3,289,244 (344)
Fault Template Attack Based on Fault Probability
Template attack uses leaked information from various side channels and may break out the countermeasures embedded in the algorithm, which is considered a powerful side-channel attack method.
Tong Wu, Dawei Zhou, Lei Du, Shiwei Wang
doaj +1 more source
Information Warfare, Threats and Information Security
The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security.
M. A. Kazakov, D. N. Bespalov
openaire +6 more sources
ABSTRACT Background Bladder dysfunction affects over 85% of people with multiple sclerosis (PwMS), yet current assessment methods are limited to periodic in‐clinic evaluations or subjective patient reports, failing to capture real‐world symptom fluctuations.
Valerie J. Block+8 more
wiley +1 more source
On the Performance Analysis for CSIDH-Based Cryptosystems
In this paper, we present the performance and security analysis for various commutative SIDH (CSIDH)-based algorithms. As CSIDH offers a smaller key size than SIDH and provides a relatively efficient signature scheme, numerous CSIDH-based key exchange ...
Donghoe Heo+3 more
doaj +1 more source
Comments on the Clique Number of Zero-Divisor Graphs of Zn
In 2008, J. Skowronek-kazio´w extended the study of the clique number ωGZn to the zero-divisor graph of the ring Zn, but their result was imperfect. In this paper, we reconsider ωGZn of the ring Zn and give some counterexamples. We propose a constructive
Yanzhao Tian, Lixiang Li
doaj +1 more source
Multimodal Autonomic Biomarkers Predict Phenoconversion in Pure Autonomic Failure
ABSTRACT Background Pure autonomic failure (PAF) presents with autonomic failure without other neurological features. A third develop central neurological features, fulfilling criteria for multiple system atrophy (MSA) and Lewy body diseases (LBD), including Parkinson's disease and Dementia with Lewy bodies.
S. Koay+12 more
wiley +1 more source
ABSTRACT Objectives Repetitive transcranial magnetic stimulation (rTMS) is a non‐invasive brain stimulation strategy with a demonstrated potential to reinforce the residual pathways after a spinal cord injury (SCI). A preclinically tested high‐frequency (15 Hz) rTMS (15 Hz rTMS) protocol was shown to induce corticospinal tract axon regeneration growth ...
Nabila Brihmat+8 more
wiley +1 more source
X-ray image-based prohibited item detection plays a crucial role in modern public security systems. Despite significant advancements in deep learning, challenges such as feature extraction, object occlusion, and model complexity remain.
Kai Zhao+3 more
doaj +1 more source
Research on Hybrid Recommendation Model for Personalized Recommendation Scenarios
One of the five types of Internet information service recommendation technologies is the personalized recommendation algorithm, and knowledge graphs are frequently used in these algorithms.
Wenkai Ni+3 more
doaj +1 more source