Results 61 to 70 of about 3,238,646 (347)

On the Performance Analysis for CSIDH-Based Cryptosystems

open access: yesApplied Sciences, 2020
In this paper, we present the performance and security analysis for various commutative SIDH (CSIDH)-based algorithms. As CSIDH offers a smaller key size than SIDH and provides a relatively efficient signature scheme, numerous CSIDH-based key exchange ...
Donghoe Heo   +3 more
doaj   +1 more source

Fault Template Attack Based on Fault Probability

open access: yesIEEE Access, 2023
Template attack uses leaked information from various side channels and may break out the countermeasures embedded in the algorithm, which is considered a powerful side-channel attack method.
Tong Wu, Dawei Zhou, Lei Du, Shiwei Wang
doaj   +1 more source

Health Information and Social Security Entitlements [PDF]

open access: yes, 2013
This study examines whether new health information, obtained through medical screening, affects entitlements to Social Security benefits. Random assignment of information is derived from a unique feature of the Continuous National Health and Nutrition ...
Perry Singleton
core   +1 more source

Information Security

open access: yes, 2013
Information ...
You,Ilsun, Weippl,Edgar
openaire   +1 more source

Actionable Wearables Data for the Neurology Clinic: A Proof‐of‐Concept Tool

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Wearable devices can monitor key health and fitness domains. In multiple sclerosis (MS), monitoring step count and sleep is feasible, valid, and offers a holistic glimpse of patient functioning and worsening. However, data generated from wearables are typically unavailable at the point of care.
Nicolette Miller   +12 more
wiley   +1 more source

Vehicle Trajectory Prediction Method for Task Offloading in Vehicular Edge Computing

open access: yesSensors, 2023
Real-time computation tasks in vehicular edge computing (VEC) provide convenience for vehicle users. However, the efficiency of task offloading seriously affects the quality of service (QoS).
Ruibin Yan   +3 more
doaj   +1 more source

Phenotyping Healthcare Use 2–3 Decades Before the First Multiple Sclerosis Demyelinating Event

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Phenotype hospital, physician, and emergency department (ED) visits by diagnoses and specialty up to 29 years pre‐multiple sclerosis (MS) onset versus a matched population without MS. Methods We identified people with MS (PwMS) using population‐based administrative data from Ontario, Canada (1991–2020).
Helen Tremlett   +8 more
wiley   +1 more source

A lightweight Xray-YOLO-Mamba model for prohibited item detection in X-ray images using selective state space models

open access: yesScientific Reports
X-ray image-based prohibited item detection plays a crucial role in modern public security systems. Despite significant advancements in deep learning, challenges such as feature extraction, object occlusion, and model complexity remain.
Kai Zhao   +3 more
doaj   +1 more source

Information Flow Model for Commercial Security [PDF]

open access: yes, 2009
Information flow in Discretionary Access Control (DAC) is a well-known difficult problem. This paper formalizes the fundamental concepts and establishes a theory of information flow security.
Pan, Jene
core   +1 more source

Abstract Model Counting: A Novel Approach for Quantification of Information Leaks [PDF]

open access: yes, 2014
acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo theories, symbolic execution location: Kyoto, Japan numpages: 10acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo ...
ASIA CCS '14 Proceedings of the 9th ACM symposium on Information, computer and communications security   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy