Results 91 to 100 of about 22,820 (205)
Revocable Identity-Based Encryption Scheme Under LWE Assumption in the Standard Model
A revocable identity-based encryption (IBE) scheme under learning with error (LWE) assumption from lattice is proposed; compared with the existing IBE schemes from lattices, two improvements are available in the new scheme.
Yaling Zhang, Shangping Wang, Qing Du
doaj +1 more source
Quantum‐Resistant Security in Digital Twin Healthcare Systems
Quantum‐safe architecture for secure healthcare data transmission integrating QKD, edge devices, and cloud‐based Digital Twin analytics. ABSTRACT The development of digital twin (DT) systems for healthcare presents several challenges, particularly in ensuring data protection and communication security in real‐time environments.
Ahmed K. Jameil, Hamed Al‐Raweshidy
wiley +1 more source
With the purpose of developing an alternative set yogurt with high consumer acceptability, liquid whole egg (LWE), at levels that varied from 0 to 30%, was incorporated into set yogurt, and the effects on the physicochemical, quality, fermentation, and ...
Lijie Yang +3 more
doaj +1 more source
Increased mROS Generation Associates With Cardiovascular Risk in BioHEART‐CT PBMCs
ABSTRACT Coronary artery disease (CAD) remains a leading cause of morbidity and mortality worldwide, and identifying accessible blood‐based biomarkers is therefore a clinical priority. Given the involvement of oxidative stress and immune cell dysfunction in atherosclerosis, we investigated whether mitochondrial reactive oxygen species (mROS) production
W. Eugene Lee +9 more
wiley +1 more source
The rapid increase in the number of internet of things (IoT) devices in the healthcare sector has produced an ecosystem of multimodal data that includes physiological signals, behavioral measurements, and electronic health records. Nevertheless, centralized analytics are dangerous to the privacy and safety of patient data.
Ravikumar R. N. +4 more
wiley +1 more source
The rapid expansion of the Industrial Internet of Things (IIoT) presents pressing challenges for secure, efficient, and privacy‐preserving communication among users, sensors, and cloud infrastructures. Existing lightweight authentication schemes, primarily based on classical cryptographic assumptions, are increasingly vulnerable to the emerging threat ...
Tinashe Magara +2 more
wiley +1 more source
A connection between cryptography and polynomial functions is extremely significant. Mathematical performance of polynomials helps to enhance the cryptographic primitives, which are trustworthy as well as straightforward representation tools, in everyday use. In this research, explicit topological sequences Qf which correspond to degree‐based, distance‐
Mohammad Mazyad Hazzazi +5 more
wiley +1 more source
The Learning With Errors problem is the basis of a few cryptosystems, and a foundation for many fully homomorphic encryption (FHE) schemes. In this article I’ll describe a technique used in some of these schemes called modulus switching. In brief, an LWE sample is a vector of values in $\mathbb{Z}/q\mathbb{Z}$ for some $q$, and in LWE cryptosystems an ...
openaire +1 more source
Hardness of LWE on General Entropic Distributions
The hardness of the Learning with Errors (LWE) problem is by now a cornerstone of the cryptographic landscape. In many of its applications the so called ``LWE secret'' is not sampled uniformly, but comes from a distribution with some min-entropy. This variant, known as ``Entropic LWE'', has been studied in a number of works, starting with Goldwasser et
Brakerski, Zvika, Döttling, Nico
openaire +1 more source
Morphology and function of pinniped necks: The long and short of it
Abstract Terrestrial vertebrates from at least 30 distinct lineages in both extinct and extant clades have returned to aquatic environments. With these transitions came numerous morphological adaptations to accommodate life in water. Relatively little attention has been paid to the cervical region when tracking this transition.
Justin Keller +3 more
wiley +1 more source

