Results 91 to 100 of about 22,820 (205)

Revocable Identity-Based Encryption Scheme Under LWE Assumption in the Standard Model

open access: yesIEEE Access, 2018
A revocable identity-based encryption (IBE) scheme under learning with error (LWE) assumption from lattice is proposed; compared with the existing IBE schemes from lattices, two improvements are available in the new scheme.
Yaling Zhang, Shangping Wang, Qing Du
doaj   +1 more source

Quantum‐Resistant Security in Digital Twin Healthcare Systems

open access: yesIET Wireless Sensor Systems, Volume 16, Issue 1, January/December 2026.
Quantum‐safe architecture for secure healthcare data transmission integrating QKD, edge devices, and cloud‐based Digital Twin analytics. ABSTRACT The development of digital twin (DT) systems for healthcare presents several challenges, particularly in ensuring data protection and communication security in real‐time environments.
Ahmed K. Jameil, Hamed Al‐Raweshidy
wiley   +1 more source

Effect of Whole Egg Liquid on Physicochemical, Quality, Fermentation and Sensory Characteristics of Yogurt

open access: yesFoods
With the purpose of developing an alternative set yogurt with high consumer acceptability, liquid whole egg (LWE), at levels that varied from 0 to 30%, was incorporated into set yogurt, and the effects on the physicochemical, quality, fermentation, and ...
Lijie Yang   +3 more
doaj   +1 more source

Increased mROS Generation Associates With Cardiovascular Risk in BioHEART‐CT PBMCs

open access: yesClinical and Translational Science, Volume 19, Issue 1, January 2026.
ABSTRACT Coronary artery disease (CAD) remains a leading cause of morbidity and mortality worldwide, and identifying accessible blood‐based biomarkers is therefore a clinical priority. Given the involvement of oxidative stress and immune cell dysfunction in atherosclerosis, we investigated whether mitochondrial reactive oxygen species (mROS) production
W. Eugene Lee   +9 more
wiley   +1 more source

Privacy‐Aware Federated Recommender Systems for IoT Healthcare: A Review of Computational Methods, Multimodality, and Optimization for Real‐Time Personalization

open access: yesApplied Computational Intelligence and Soft Computing, Volume 2026, Issue 1, 2026.
The rapid increase in the number of internet of things (IoT) devices in the healthcare sector has produced an ecosystem of multimodal data that includes physiological signals, behavioral measurements, and electronic health records. Nevertheless, centralized analytics are dangerous to the privacy and safety of patient data.
Ravikumar R. N.   +4 more
wiley   +1 more source

PQ‐AuthN‐IIoT: A Lightweight, LWE‐Based Postquantum and Privacy‐Preserving Mutual Authentication Scheme for Resource‐Constrained Industrial IoT Systems

open access: yesJournal of Computer Networks and Communications, Volume 2026, Issue 1, 2026.
The rapid expansion of the Industrial Internet of Things (IIoT) presents pressing challenges for secure, efficient, and privacy‐preserving communication among users, sensors, and cloud infrastructures. Existing lightweight authentication schemes, primarily based on classical cryptographic assumptions, are increasingly vulnerable to the emerging threat ...
Tinashe Magara   +2 more
wiley   +1 more source

Polynomial Representations of Weak Inverse Property Quasigroups and Their Role in Cryptographic Primitives

open access: yesJournal of Mathematics, Volume 2026, Issue 1, 2026.
A connection between cryptography and polynomial functions is extremely significant. Mathematical performance of polynomials helps to enhance the cryptographic primitives, which are trustworthy as well as straightforward representation tools, in everyday use. In this research, explicit topological sequences Qf which correspond to degree‐based, distance‐
Mohammad Mazyad Hazzazi   +5 more
wiley   +1 more source

Modulus Switching in LWE

open access: yes, 2022
The Learning With Errors problem is the basis of a few cryptosystems, and a foundation for many fully homomorphic encryption (FHE) schemes. In this article I’ll describe a technique used in some of these schemes called modulus switching. In brief, an LWE sample is a vector of values in $\mathbb{Z}/q\mathbb{Z}$ for some $q$, and in LWE cryptosystems an ...
openaire   +1 more source

Hardness of LWE on General Entropic Distributions

open access: yes, 2020
The hardness of the Learning with Errors (LWE) problem is by now a cornerstone of the cryptographic landscape. In many of its applications the so called ``LWE secret'' is not sampled uniformly, but comes from a distribution with some min-entropy. This variant, known as ``Entropic LWE'', has been studied in a number of works, starting with Goldwasser et
Brakerski, Zvika, Döttling, Nico
openaire   +1 more source

Morphology and function of pinniped necks: The long and short of it

open access: yesThe Anatomical Record, Volume 308, Issue 12, Page 3175-3185, December 2025.
Abstract Terrestrial vertebrates from at least 30 distinct lineages in both extinct and extant clades have returned to aquatic environments. With these transitions came numerous morphological adaptations to accommodate life in water. Relatively little attention has been paid to the cervical region when tracking this transition.
Justin Keller   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy