Results 61 to 70 of about 4,573,671 (268)

A Systematic Review of Evidence on the Clinical Effectiveness of Surveillance Imaging in Children With Medulloblastoma and Ependymoma

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Surveillance imaging aims to detect tumour relapse before symptoms develop, but it's unclear whether earlier detection of relapse leads to better outcomes in children and young people (CYP) with medulloblastoma and ependymoma. This systematic review aims to identify relevant literature to determine the efficacy of surveillance magnetic ...
Lucy Shepherd   +3 more
wiley   +1 more source

Electrical tree degradation of MgO/epoxy resin composites at different voltage frequencies

open access: yesHigh Voltage
Electrical tree degradation is one of the main causes of insulation failure in high‐frequency transformers. Electrical tree degradation is studied on pure epoxy resin (EP) and MgO/EP composites at frequencies ranging from 50 Hz to 130 kHz.
Yunxiao Zhang   +5 more
doaj   +1 more source

M2GSNet: Multi-Modal Multi-Task Graph Spatiotemporal Network for Ultra-Short-Term Wind Farm Cluster Power Prediction

open access: yesApplied Sciences, 2020
Ultra-short-term wind power prediction is of great importance for the integration of renewable energy. It is the foundation of probabilistic prediction and even a slight increase in the prediction accuracy can exert significant improvement for the safe ...
Hang Fan   +4 more
doaj   +1 more source

Quantum random number generation for 1.25 GHz quantum key distribution systems

open access: yes, 2015
Security proofs of quantum key distribution (QKD) systems usually assume that the users have access to source of perfect randomness. State-of-the-art QKD systems run at frequencies in the GHz range, requiring a sustained GHz rate of generation and ...
Houlmann, R.   +4 more
core   +2 more sources

Federated distributed key generation

open access: yesFuture Generation Computer Systems
Distributed Key Generation (DKG) underpins threshold cryptography in many systems, including decentralized wallets, validator key ceremonies, cross-chain bridges, threshold signatures, secure multiparty computation, and internet voting. Classical ($t$,$n$)-DKG assumes a fixed group of n parties and a global threshold $t$, requiring full and timely ...
Stanislaw Baranski, Julian Szymanski
openaire   +2 more sources

Asynchronous Remote Key Generation

open access: yesProceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
WebAuthn, forming part of FIDO2, is a W3C standard for strong authentication, which employs digital signatures to authenticate web users whilst preserving their privacy. Owned by users, WebAuthn authenticators generate attested and unlinkable public-key credentials for each web service to authenticate users.
Nick Frymann   +5 more
openaire   +2 more sources

Secret key generation through a relay [PDF]

open access: yes2016 IEEE Information Theory Workshop (ITW), 2016
We consider problems of two-user secret key generation through an intermediate relay. Each user observes correlated source sequences and communicates to the relay over rate-limited noiseless links. The relay processes and broadcasts information to the two users over another rate-limited link.
Kittichokechai, Kittipong   +2 more
openaire   +2 more sources

Pathogenic Germline PALB2 and RAD50 Variants in Patients With Relapsed Ewing Sarcoma

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Approximately 10% of patients with Ewing sarcoma (EwS) have pathogenic germline variants. Here, we report two cases: first, a novel germline pathogenic variant in partner and localizer of BRCA2 (PALB2) in a patient with a late EwS relapse. Its impact on homologous recombination is demonstrated, and breast cancer risk is discussed.
Molly Mack   +12 more
wiley   +1 more source

Non-Reconciled Physical-Layer Keys-Assisted Secure Communication Scheme Based on Channel Correlation

open access: yesEntropy, 2022
Physical-layer key generation technology requires information reconciliation to correct channel estimation errors between two legitimate users. However, sending the reconciliation signals over the public channel increases the communication overhead and ...
Meng Wang   +5 more
doaj   +1 more source

Secret Key Generation Based on AoA Estimation for Low SNR Conditions

open access: yes, 2014
In the context of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. Therefore an accurate estimation of this characteristic is the core for reliable secret key generation ...
Badawy, Ahmed   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy