Results 101 to 110 of about 1,734,839 (338)

Secure and Efficient Multi-Authority Attribute-Based Encryption Scheme From Lattices

open access: yesIEEE Access, 2019
Attribute-based encryption (ABE) mechanism on lattices can against quantum attack and guarantees fine-grained access control of encrypted data, and it has been widely used in cloud computing and privacy protection.
Yuan Liu   +3 more
doaj   +1 more source

Functional and Structural Evidence of Neurofluid Circuit Aberrations in Huntington Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Disrupted neurofluid regulation may contribute to neurodegeneration in Huntington disease (HD). Because neurofluid pathways influence waste clearance, inflammation, and the distribution of central nervous system (CNS)–delivered therapeutics, understanding their dysfunction is increasingly important as targeted treatments emerge.
Kilian Hett   +8 more
wiley   +1 more source

ERRORS IN THE CLASSROOM: DILEMMAS AND PRACTICES

open access: yesLingua: Jurnal Bahasa, Sastra dan Pengajarannya, 2015
Human learning is fundamentally a process that involves the making of errors. But the issue of error and how errors are treated in the classroom is still dilemma for many teachers.
Taslimah Retno Marpinjun
doaj   +1 more source

Lived and Care Experiences of Chronic Musculoskeletal Shoulder Pain in Australian Adults: A Qualitative Study

open access: yesArthritis Care &Research, EarlyView.
Objective Australian evidence on lived and care experiences of chronic musculoskeletal shoulder pain (CMSP), irrespective of disorder classification or disease, is limited. However, such evidence is important for person‐centered care and informing local service pathways and care guidelines or standards.
Sonia Ranelli   +8 more
wiley   +1 more source

On the independence heuristic in the dual attack

open access: yesJournal of Mathematical Cryptology
Post-quantum cryptography deals with the development and analysis of cryptographic schemes that are assumed to be secure even against attackers with access to a powerful quantum computer.
Bashiri Kaveh, Wiemers Andreas
doaj   +1 more source

Learning from errors: Exploration of the monitoring learning effect. [PDF]

open access: yesCognition, 2022
Middleton EL   +3 more
europepmc   +1 more source

Identifying High‐Impact Solutions to Address Racial and Ethnic Health Disparities in Lupus: A Consensus‐Based Approach

open access: yesArthritis Care &Research, EarlyView.
Objective We conducted formative research aimed at identifying solutions that address inequitable health outcomes in lupus due to adverse social determinants of health (SDoH). Methods We conducted a search for keywords, which provided insights into potential solutions and initiatives underway. An advisory panel of lupus experts iteratively reviewed the
Joy Buie   +11 more
wiley   +1 more source

mRLWE-CP-ABE: A revocable CP-ABE for post-quantum cryptography

open access: yesJournal of Mathematical Cryptology
We address the problem of user fast revocation in the lattice-based Ciphertext Policy Attribute-Based Encryption (CP-ABE) by extending the scheme originally introduced by Zhang and Zhang [Zhang J, Zhang Z.
Cianfriglia Marco   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy