Results 51 to 60 of about 3,289,244 (344)

Fault Template Attack Based on Fault Probability

open access: yesIEEE Access, 2023
Template attack uses leaked information from various side channels and may break out the countermeasures embedded in the algorithm, which is considered a powerful side-channel attack method.
Tong Wu, Dawei Zhou, Lei Du, Shiwei Wang
doaj   +1 more source

Information Security

open access: yes, 2013
Information ...
You,Ilsun, Weippl,Edgar
openaire   +1 more source

Information Warfare, Threats and Information Security

open access: yesMGIMO Review of International Relations, 2014
The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security.
M. A. Kazakov, D. N. Bespalov
openaire   +6 more sources

Continuous Monitoring of Bladder Dysfunction in People With Multiple Sclerosis: Wearables for the Bladder

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Bladder dysfunction affects over 85% of people with multiple sclerosis (PwMS), yet current assessment methods are limited to periodic in‐clinic evaluations or subjective patient reports, failing to capture real‐world symptom fluctuations.
Valerie J. Block   +8 more
wiley   +1 more source

On the Performance Analysis for CSIDH-Based Cryptosystems

open access: yesApplied Sciences, 2020
In this paper, we present the performance and security analysis for various commutative SIDH (CSIDH)-based algorithms. As CSIDH offers a smaller key size than SIDH and provides a relatively efficient signature scheme, numerous CSIDH-based key exchange ...
Donghoe Heo   +3 more
doaj   +1 more source

Comments on the Clique Number of Zero-Divisor Graphs of Zn

open access: yesJournal of Mathematics, 2022
In 2008, J. Skowronek-kazio´w extended the study of the clique number ωGZn to the zero-divisor graph of the ring Zn, but their result was imperfect. In this paper, we reconsider ωGZn of the ring Zn and give some counterexamples. We propose a constructive
Yanzhao Tian, Lixiang Li
doaj   +1 more source

Multimodal Autonomic Biomarkers Predict Phenoconversion in Pure Autonomic Failure

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Pure autonomic failure (PAF) presents with autonomic failure without other neurological features. A third develop central neurological features, fulfilling criteria for multiple system atrophy (MSA) and Lewy body diseases (LBD), including Parkinson's disease and Dementia with Lewy bodies.
S. Koay   +12 more
wiley   +1 more source

Translating a Preclinically Tested 15 Hz rTMS Protocol to Humans With Chronic Spinal Cord Injury: A Safety and Feasibility Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objectives Repetitive transcranial magnetic stimulation (rTMS) is a non‐invasive brain stimulation strategy with a demonstrated potential to reinforce the residual pathways after a spinal cord injury (SCI). A preclinically tested high‐frequency (15 Hz) rTMS (15 Hz rTMS) protocol was shown to induce corticospinal tract axon regeneration growth ...
Nabila Brihmat   +8 more
wiley   +1 more source

A lightweight Xray-YOLO-Mamba model for prohibited item detection in X-ray images using selective state space models

open access: yesScientific Reports
X-ray image-based prohibited item detection plays a crucial role in modern public security systems. Despite significant advancements in deep learning, challenges such as feature extraction, object occlusion, and model complexity remain.
Kai Zhao   +3 more
doaj   +1 more source

Research on Hybrid Recommendation Model for Personalized Recommendation Scenarios

open access: yesApplied Sciences, 2023
One of the five types of Internet information service recommendation technologies is the personalized recommendation algorithm, and knowledge graphs are frequently used in these algorithms.
Wenkai Ni   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy