Results 41 to 50 of about 4,573,671 (268)

Aggregatable Distributed Key Generation [PDF]

open access: yes, 2021
In this paper, we introduce a distributed key generation (DKG) protocol with aggregatable and publicly-verifiable transcripts. Compared with prior publicly-verifiable approaches, our DKG reduces the size of the final transcript and the time to verify it from \(\mathcal {O}(n^2)\) to \(\mathcal {O}(n \log {n})\), where n denotes the number of parties ...
Kobi Gurkan   +5 more
openaire   +1 more source

Personalizing the Pediatric Hematology/Oncology Fellowship: Adapting Training for the Next Generation

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT The pediatric hematology‐oncology fellowship training curriculum has not substantially changed since its inception. The first year of training is clinically focused, and the second and third years are devoted to scholarship. However, this current structure leaves many fellows less competitive in the current job market, resulting in ...
Scott C. Borinstein   +3 more
wiley   +1 more source

A Complete Key Management Scheme for LoRaWAN v1.1

open access: yesSensors, 2021
Security is one of the major concerns of the Internet of Things (IoT) wireless technologies. LoRaWAN is one of the emerging Low Power Wide Area Networks being developed for IoT applications.
Xingda Chen, Margaret Lech, Liuping Wang
doaj   +1 more source

Secret key generation from Gaussian sources using lattice hashing

open access: yes, 2013
We propose a simple yet complete lattice-based scheme for secret key generation from Gaussian sources in the presence of an eavesdropper, and show that it achieves strong secret key rates up to 1/2 nat from the optimal in the case of "degraded" source ...
Bloch, Matthieu R.   +2 more
core   +2 more sources

Interactive Demand Shifting: in the Context of Emerging Energy Technologies [PDF]

open access: yes, 2015
We are entering a key time period for home energy. While ubiquitous computing takes an increasing space in our daily life, emerging energy technologies including local generation and electric vehicle are leaving the stage of pioneer's users to become ...
Bourgeois, Jacky
core   +1 more source

Psychosocial Outcomes in Patients With Endocrine Tumor Syndromes: A Systematic Review

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction The combination of disease manifestations, the familial burden, and varying penetrance of endocrine tumor syndromes (ETSs) is unique. This review aimed to portray and summarize available data on psychosocial outcomes in patients with ETSs and explore gaps and opportunities for future research and care.
Daniël Zwerus   +6 more
wiley   +1 more source

Interface Engineering for Synergistic Achievement of Enhanced Thermal Conductivity and Suppressed Dielectric Loss of Epoxy/Boron Nitride Composite

open access: yesHigh Voltage
Interface design for synergistic improvement of the thermal conductivity and dielectric properties of dielectrics is urgently needed but still challenging for the next generation of electronic and electrical equipment development.
Tengteng Niu   +3 more
doaj   +1 more source

Physical layer security techniques for data transmission for future wireless networks

open access: yesSecurity and Safety, 2022
The broadcast nature of wireless communication systems makes wireless transmission extremely susceptible to eavesdropping and even malicious interference.
Shi Weiping   +9 more
doaj   +1 more source

The MedSupport Multilevel Intervention to Enhance Support for Pediatric Medication Adherence: Development and Feasibility Testing

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction We developed MedSupport, a multilevel medication adherence intervention designed to address root barriers to medication adherence. This study sought to explore the feasibility and acceptability of the MedSupport intervention strategies to support a future full‐scale randomized controlled trial.
Elizabeth G. Bouchard   +8 more
wiley   +1 more source

Quantum-locked key distribution at nearly the classical capacity rate [PDF]

open access: yes, 2014
Quantum data locking is a protocol that allows for a small secret key to (un)lock an exponentially larger amount of information, hence yielding the strongest violation of the classical one-time pad encryption in the quantum setting.
Lloyd, Seth, Lupo, Cosmo
core   +2 more sources

Home - About - Disclaimer - Privacy