Results 81 to 90 of about 131,074 (313)
Certificateless Deniable Authenticated Encryption for Location-Based Privacy Protection
Deniable authenticated encryption (DAE) is a cryptographic primitive that supports data confidentiality with deniable authentication in an efficient manner. The DAE plays a significant role in location-based service systems for privacy protection.
Guanhua Chen +6 more
doaj +1 more source
Accessible user interface support for multi-device ubiquitous applications: architectural modifiability considerations [PDF]
The market for personal computing devices is rapidly expanding from PC, to mobile, home entertainment systems, and even the automotive industry. When developing software targeting such ubiquitous devices, the balance between development costs and market ...
Botsikas, Andreas +4 more
core +2 more sources
ABSTRACT Objective Glioma recurrence severely impacts patient prognosis, with current treatments showing limited efficacy. Traditional methods struggle to analyze recurrence mechanisms due to challenges in assessing tumor heterogeneity, spatial dynamics, and gene networks.
Lei Qiu +10 more
wiley +1 more source
Post-quantum Security of Key Encapsulation Mechanism Against CCA Attacks with a Single Decapsulation Query [PDF]
Haodong Jiang, Zhi Ma, Zhenfeng Zhang
openalex +1 more source
Understanding and Constructing AKE via Double-Key Key Encapsulation Mechanism
Motivated by abstracting the common idea behind several implicitly authenticated key exchange (AKE) protocols, we introduce a primitive that we call double-key key encapsulation mechanism (2-key KEM). It is a special type of KEM involving two pairs of secret-public keys and satisfying some function and security property.
XUE, Haiyang +4 more
openaire +2 more sources
ABSTRACT Introduction Progressive Supranuclear Palsy (PSP) is a neurodegenerative ‘tauopathy’ with predominating pathology in the basal ganglia and midbrain. Caudal tau spread frequently implicates the cerebellum; however, the pattern of atrophy remains equivocal.
Chloe Spiegel +8 more
wiley +1 more source
Secure Cryptographic Key Encapsulation and Recovery Scheme in Noisy Network Conditions
In this study, we present the Response-Based Key Encapsulation Mechanism (R-KEM), an ephemeral key encapsulation and recovery scheme tailored for cryptographic systems in high-noise, high-jamming network environments.
Dina Ghanai Miandoab +5 more
doaj +1 more source
Functional and Structural Evidence of Neurofluid Circuit Aberrations in Huntington Disease
ABSTRACT Objective Disrupted neurofluid regulation may contribute to neurodegeneration in Huntington disease (HD). Because neurofluid pathways influence waste clearance, inflammation, and the distribution of central nervous system (CNS)–delivered therapeutics, understanding their dysfunction is increasingly important as targeted treatments emerge.
Kilian Hett +8 more
wiley +1 more source
A Concrete LIP-Based KEM With Simple Lattices
Recent developments have been made in the construction of cryptosystems with security based on the hardness of the lattice isomorphism problem (LIP). Due to lattice conjectures, one may expect in the future that breaking such schemes is computationally ...
Gustavo de Castro Biage +4 more
doaj +1 more source
OSKR/OKAI: Systematic Optimization of Key Encapsulation Mechanisms from Module Lattice [PDF]
Shiyu Shen +4 more
openalex +1 more source

