Results 61 to 70 of about 3,500,013 (329)

Remote Monitoring in Myasthenia Gravis: Exploring Symptom Variability

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Myasthenia gravis (MG) is a rare, autoimmune disorder characterized by fluctuating muscle weakness and potential life‐threatening crises. While continuous specialized care is essential, access barriers often delay timely interventions. To address this, we developed MyaLink, a telemedical platform for MG patients.
Maike Stein   +13 more
wiley   +1 more source

On the Performance Analysis for CSIDH-Based Cryptosystems

open access: yesApplied Sciences, 2020
In this paper, we present the performance and security analysis for various commutative SIDH (CSIDH)-based algorithms. As CSIDH offers a smaller key size than SIDH and provides a relatively efficient signature scheme, numerous CSIDH-based key exchange ...
Donghoe Heo   +3 more
doaj   +1 more source

Patterns of Postictal Abnormalities in Relation to Status Epilepticus in Adults

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Abnormalities on peri‐ictal diffusion‐weighted magnetic resonance imaging (DWI‐PMAs) are well‐established for patients with status epilepticus (SE), but knowledge on patterns of DWI‐PMAs and their prognostic impact is sparse. Methods This systematic review and individual participant data meta‐analysis included observational studies ...
Andrea Enerstad Bolle   +11 more
wiley   +1 more source

Quantum cryptography: a practical information security perspective [PDF]

open access: yes, 2009
Quantum Key Exchange (QKE, also known as Quantum Key Distribution or QKD) allows communicating parties to securely establish cryptographic keys. It is a well-established fact that all QKE protocols require that the parties have access to an authentic ...
Paterson, Kenneth G.   +2 more
core   +1 more source

Nonmalleable Information Flow: Technical Report

open access: yes, 2017
Noninterference is a popular semantic security condition because it offers strong end-to-end guarantees, it is inherently compositional, and it can be enforced using a simple security type system.
Arden, Owen   +2 more
core   +1 more source

Innate Immune Reprogramming Mediated by Endogenous Retroelement Dysregulation Drives Multiple Sclerosis Progression

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
Epigenetic reprogramming in hematopoietic stem and progenitor cells (HSPCs) and downstream myeloid cells, mediated by H3.3 downregulation and endogenous retroelement (ERE) overexpression, contributes to the progression of multiple sclerosis (MS). ABSTRACT Background Skewed myelopoiesis in the bone marrow has been identified as a key driver of multiple ...
Li‐Mei Xiao   +6 more
wiley   +1 more source

Information Security

open access: yes, 2014
The online threat landscape does not stand still. One of the best ways to understand the threats is to understand the attackers and their motives. Who are the attackers? What makes them tic? Where are they going? And what's going to happen next?
  +5 more sources

Gatac: Research on microservice access control techniques based on trust assessment and game analysis

open access: yesCybersecurity
Microservice architecture faces security issues due to the large scale of services, resulting in a large attack surface. Integrating the concept of “continuous authentication, never trust” from the zero-trust security model into the access control of ...
Zhangwen Li   +4 more
doaj   +1 more source

Vox2Face: Speech-Driven Face Generation via Identity-Space Alignment and Diffusion Self-Consistency

open access: yesInformation
Speech-driven face generation aims to synthesize a face image that matches a speaker’s identity from speech alone. However, existing methods typically trade identity fidelity for visual quality and rely on large end-to-end generators that are difficult ...
Qiming Ma   +7 more
doaj   +1 more source

The NPFIT strategy for information security of care record service [PDF]

open access: yes, 2011
The National Programme for IT in England doesn’t have a one-document strategy for its information security of the Care Records Service, which is the national EHR system.
Mohammad, Y, Stergioulas, L
core  

Home - About - Disclaimer - Privacy