Results 61 to 70 of about 671,694 (290)
Several certificateless short signature and multisignature schemes based on traditional public key infrastructure (PKI) or identity-based cryptosystem (IBC) have been proposed in the literature; however, no certificateless short sequential (or serial ...
SK Hafizul Islam, G.P. Biswas
doaj +1 more source
Analysis of Error Impact for Batch Handover Authentication Protocols in Mobile Wireless Networks
The handover authentication protocol controls the access of multiple access points in a mobile wireless network (MWN). PairHand is a handover authentication protocol that uses identity-based public key cryptography based on bilinear pairing and provides ...
Younsoo Park, Ho-Hyun Park
doaj +1 more source
Next‐generation proteomics improves lung cancer risk prediction
This is one of very few studies that used prediagnostic blood samples from participants of two large population‐based cohorts. We identified, evaluated, and validated an innovative protein marker model that outperformed an established risk prediction model and criteria employed by low‐dose computed tomography in lung cancer screening trials.
Megha Bhardwaj +4 more
wiley +1 more source
Distortion maps for supersingular genus two curves
Distortion maps are a useful tool for pairing based cryptography. Compared with elliptic curves, the case of hyperelliptic curves of genus g > 1 is more complicated, since the full torsion subgroup has rank 2g.
Galbraith Steven D. +3 more
doaj +1 more source
The LINC01116 long noncoding RNA is induced by hypoxia and associated with poor prognosis and high recurrence rates in two cohorts of lung adenocarcinoma patients. Here, we demonstrate that besides its expression in cancer cells, LINC01116 is markedly expressed in lymphatic endothelial cells of the tumor stroma in which it participates in hypoxia ...
Marine Gautier‐Isola +12 more
wiley +1 more source
The monodromy pairing and discrete logarithm on the Jacobian of finite graphs
Every graph has a canonical finite abelian group attached to it. This group has appeared in the literature under a variety of names including the sandpile group, critical group, Jacobian group, and Picard group.
Shokrieh Farbod
doaj +1 more source
Recently, many identity-based two-party authenticated key agreement (ID-2PAKA) protocols using elliptic curve cryptography (ECC) have been proposed, however, these protocols do not provide adequate security and their computation costs are also relatively
SK Hafizul Islam, G.P. Biswas
doaj +1 more source
Peroxidasin enables melanoma immune escape by inhibiting natural killer cell cytotoxicity
Peroxidasin (PXDN) is secreted by melanoma cells and binds the NK cell receptor NKG2D, thereby suppressing NK cell activation and cytotoxicity. PXDN depletion restores NKG2D signaling and enables effective NK cell–mediated melanoma killing. These findings identify PXDN as a previously unrecognized immune evasion factor and a potential target to improve
Hsu‐Min Sung +17 more
wiley +1 more source
Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes
Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user’s secret key by necessitating the cooperation of a security ...
Ji-Jian Chin +3 more
doaj +1 more source
A Novel Efficient Pairing-Free CP-ABE Based on Elliptic Curve Cryptography for IoT
Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic technique that integrates data encryption with access control for ensuring data security in IoT systems.
Sheng Ding, Chen Li, Hui Li
doaj +1 more source

