Results 61 to 70 of about 4,621,200 (286)

NRASQ61R Expression in Lymphatic Endothelial Cells Causes Enlarged Vessels, Hemorrhagic Chylous Effusions, and High Mortality in a Mouse Model of Kaposiform Lymphangiomatosis

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Kaposiform lymphangiomatosis (KLA) is an aggressive complex lymphatic anomaly. Patients exhibit malformed lymphatic vessels and often develop hemorrhagic effusions and elevated angiopoietin‐2 (Ang‐2) levels. A somatic NRAS p.Q61R (NRASQ61R) mutation has been associated with KLA.
C. Griffin McDaniel   +3 more
wiley   +1 more source

Ultrathin Hafnium‐Based Ferroelectric Devices for In‐Memory Computing Applications

open access: yesInformation & Functional Materials
The discovery of ferroelectricity in HfO2‐based ferroelectrics at the ultrathin scale has reignited enthusiasm for ferroelectric memory device research, propelling hafnium‐based ferroelectric devices to the forefront of nanoelectronics research ...
Chenghong Mo   +3 more
doaj   +1 more source

Secret Key Generation Based on AoA Estimation for Low SNR Conditions

open access: yes, 2014
In the context of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. Therefore an accurate estimation of this characteristic is the core for reliable secret key generation ...
Badawy, Ahmed   +5 more
core   +1 more source

Federated distributed key generation

open access: yesFuture Generation Computer Systems
Distributed Key Generation (DKG) underpins threshold cryptography in many systems, including decentralized wallets, validator key ceremonies, cross-chain bridges, threshold signatures, secure multiparty computation, and internet voting. Classical ($t$,$n$)-DKG assumes a fixed group of n parties and a global threshold $t$, requiring full and timely ...
Stanislaw Baranski, Julian Szymanski
openaire   +2 more sources

Asynchronous Remote Key Generation

open access: yesProceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
WebAuthn, forming part of FIDO2, is a W3C standard for strong authentication, which employs digital signatures to authenticate web users whilst preserving their privacy. Owned by users, WebAuthn authenticators generate attested and unlinkable public-key credentials for each web service to authenticate users.
Nick Frymann   +5 more
openaire   +2 more sources

Secret key generation through a relay [PDF]

open access: yes2016 IEEE Information Theory Workshop (ITW), 2016
We consider problems of two-user secret key generation through an intermediate relay. Each user observes correlated source sequences and communicates to the relay over rate-limited noiseless links. The relay processes and broadcasts information to the two users over another rate-limited link.
Kittichokechai, Kittipong   +2 more
openaire   +2 more sources

Financial Burden Associated With Hospitalisation Among Families of Childhood Brain Tumours in Australia

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Families of children with cancer experience significant financial strain, even with universal healthcare. Indirect costs, such as productivity losses and non‐medical expenses, are rarely included in economic evaluations, and little is known about how effectively financial aid programmes alleviate this burden. Childhood brain tumours
Megumi Lim   +8 more
wiley   +1 more source

Germline TP53 Mutations Causing Diamond–Blackfan Anemia: A French Report

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Diamond–Blackfan anemia is a rare congenital erythroblastopenia typically caused by mutations in ribosomal protein genes. Recently, gain‐of‐function mutations in TP53 have been identified as a novel cause of Diamond–Blackfan anemia. We report two French patients who both harbored a heterozygous TP53 deletion (NM_000546.5: c.1077delA; p ...
Rafael Moisan   +6 more
wiley   +1 more source

Optimal dispatching strategy of community integrated energy system considering generalized electric heating demand response and stepped carbon trading mechanism

open access: yesDiance yu yibiao
In the context of dual carbon, in order to realize the low-carbon economic operation of the integrated energy system, an optimal dispatching model of integrated energy system considering generalized electric heating demand response and stepped carbon ...
TIAN Yukun   +5 more
doaj   +1 more source

Separation of Reliability and Secrecy in Rate-Limited Secret-Key Generation [PDF]

open access: yes, 2014
For a discrete or a continuous source model, we study the problem of secret-key generation with one round of rate-limited public communication between two legitimate users.
Matthieu R. Bloch   +2 more
core  

Home - About - Disclaimer - Privacy