Results 131 to 140 of about 75,500 (332)
Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan [PDF]
Simon R. Blackburn⋆ +1 more
openalex +1 more source
ABSTRACT Background Poststroke fatigue (PSF) and frailty share substantial overlap in their manifestations, yet previous research has yielded conflicting results due to the use of heterogeneous frailty assessment tools. Objective To evaluate the independent impact of frailty on PSF using a unified measurement system (Tilburg Frailty Indicator, TFI ...
Chuan‐Bang Chen +6 more
wiley +1 more source
Real‐World Investigation of Satralizumab in Patients With Neuromyelitis Optica Spectrum Disease
ABSTRACT Objective Satralizumab, a monoclonal antibody targeting the interleukin‐6 receptor, has demonstrated efficacy in clinical trials for neuromyelitis optica spectrum disorder (NMOSD). However, its real‐world effectiveness and safety compared to conventional immunosuppressive therapies remain uncertain.
Li‐Tsung Lin +2 more
wiley +1 more source
An Enhanced Hash-based Message Authentication Code using BCrypt
Jerone B. Alimpia
openalex +1 more source
TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks [PDF]
Zheng Gong +4 more
openalex +1 more source
Remote Assessment of Ataxia Severity in SCA3 Across Multiple Centers and Time Points
ABSTRACT Objective Spinocerebellar ataxia type 3 (SCA3) is a genetically defined ataxia. The Scale for Assessment and Rating of Ataxia (SARA) is a clinician‐reported outcome that measures ataxia severity at a single time point. In its standard application, SARA fails to capture short‐term fluctuations, limiting its sensitivity in trials.
Marcus Grobe‐Einsler +20 more
wiley +1 more source
Two-Level QR Code for Secured Message Sharing and Document Authentication
Shreya V. Uttarwar, Bagade A. M.
openalex +1 more source
Functional Message Authentication Codes With Message and Function Privacy
Functional signatures were allowed anyone to sign any messages in the range of function f , who possesses the secret key s k f .
Pu Li, Muhua Liu, Youlin Shang
openaire +2 more sources
A spin group (SG)‐based mechanism is proposed to realize a single pair of Weyl points. PT‐symmetric nodal lines (NLs) persist under T‐breaking, protected by the combination of SG and P symmetry. When considering spin‐orbit coupling, the SG‐protected NL will split into Weyl points, which will also induce anomalous transport phenomena arising from ...
Shifeng Qian +6 more
wiley +1 more source
Multi-message Authentication over Noisy Channel with Secure Channel Codes [PDF]
Dajiang Chen +6 more
openalex +1 more source

