Results 61 to 70 of about 4,621,200 (286)
ABSTRACT Background Kaposiform lymphangiomatosis (KLA) is an aggressive complex lymphatic anomaly. Patients exhibit malformed lymphatic vessels and often develop hemorrhagic effusions and elevated angiopoietin‐2 (Ang‐2) levels. A somatic NRAS p.Q61R (NRASQ61R) mutation has been associated with KLA.
C. Griffin McDaniel +3 more
wiley +1 more source
Ultrathin Hafnium‐Based Ferroelectric Devices for In‐Memory Computing Applications
The discovery of ferroelectricity in HfO2‐based ferroelectrics at the ultrathin scale has reignited enthusiasm for ferroelectric memory device research, propelling hafnium‐based ferroelectric devices to the forefront of nanoelectronics research ...
Chenghong Mo +3 more
doaj +1 more source
Secret Key Generation Based on AoA Estimation for Low SNR Conditions
In the context of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. Therefore an accurate estimation of this characteristic is the core for reliable secret key generation ...
Badawy, Ahmed +5 more
core +1 more source
Federated distributed key generation
Distributed Key Generation (DKG) underpins threshold cryptography in many systems, including decentralized wallets, validator key ceremonies, cross-chain bridges, threshold signatures, secure multiparty computation, and internet voting. Classical ($t$,$n$)-DKG assumes a fixed group of n parties and a global threshold $t$, requiring full and timely ...
Stanislaw Baranski, Julian Szymanski
openaire +2 more sources
Asynchronous Remote Key Generation
WebAuthn, forming part of FIDO2, is a W3C standard for strong authentication, which employs digital signatures to authenticate web users whilst preserving their privacy. Owned by users, WebAuthn authenticators generate attested and unlinkable public-key credentials for each web service to authenticate users.
Nick Frymann +5 more
openaire +2 more sources
Secret key generation through a relay [PDF]
We consider problems of two-user secret key generation through an intermediate relay. Each user observes correlated source sequences and communicates to the relay over rate-limited noiseless links. The relay processes and broadcasts information to the two users over another rate-limited link.
Kittichokechai, Kittipong +2 more
openaire +2 more sources
ABSTRACT Background Families of children with cancer experience significant financial strain, even with universal healthcare. Indirect costs, such as productivity losses and non‐medical expenses, are rarely included in economic evaluations, and little is known about how effectively financial aid programmes alleviate this burden. Childhood brain tumours
Megumi Lim +8 more
wiley +1 more source
Germline TP53 Mutations Causing Diamond–Blackfan Anemia: A French Report
ABSTRACT Diamond–Blackfan anemia is a rare congenital erythroblastopenia typically caused by mutations in ribosomal protein genes. Recently, gain‐of‐function mutations in TP53 have been identified as a novel cause of Diamond–Blackfan anemia. We report two French patients who both harbored a heterozygous TP53 deletion (NM_000546.5: c.1077delA; p ...
Rafael Moisan +6 more
wiley +1 more source
In the context of dual carbon, in order to realize the low-carbon economic operation of the integrated energy system, an optimal dispatching model of integrated energy system considering generalized electric heating demand response and stepped carbon ...
TIAN Yukun +5 more
doaj +1 more source
Separation of Reliability and Secrecy in Rate-Limited Secret-Key Generation [PDF]
For a discrete or a continuous source model, we study the problem of secret-key generation with one round of rate-limited public communication between two legitimate users.
Matthieu R. Bloch +2 more
core

