Results 41 to 50 of about 3,071,363 (328)

On distilling secure key from reducible private states and (non)existence of entangled key-undistillable states

open access: yesNew Journal of Physics, 2018
Hereunder, we study the class of irreducible private states that are private states from which all the secret content is accessible via measuring their key part.
K Horodecki   +3 more
doaj   +1 more source

Private Key and Group Key Generation Using Correlated Sources and Wiretap Broadcast Channel in Presence of One-Way Public Communication

open access: yesIEEE Access, 2019
Encryption with shared key is one of the methods to ensure secure communication. To meet the requirements of keys, this paper investigates the problem of generating private key (PK) and group key (GK) using correlated sources and discrete memoryless ...
Shixun Gong   +3 more
doaj   +1 more source

A new code‐based digital signature based on the McEliece cryptosystem

open access: yesIET Communications, 2023
Digital signature schemes are used for the authentication and verification of signatures. The Courtois–Finiasz–Sendrier (CFS) digital signature is a well‐known code‐based digital signature scheme based on the Niederreiter cryptosystem. However, it is not
Farshid Haidary Makoui   +2 more
doaj   +1 more source

A New Secret key Agreement Scheme in a Four-Terminal Network

open access: yes, 2011
A new scenario for generating a secret key and two private keys among three Terminals in the presence of an external eavesdropper is considered. Terminals 1, 2 and 3 intend to share a common secret key concealed from the external eavesdropper (Terminal 4)
Aref, Mohammad Reza   +2 more
core   +1 more source

Medicines and vaccines for the world's poorest: Is there any prospect for public-private cooperation? [PDF]

open access: yes, 2005
This paper reviews the current status of the global pharmaceutical industry and its research and development focus in the context of the health care needs of the developing world.
Pathania, Vikram, Scheffler, Richard M
core   +3 more sources

Architecture and key technologies of 5G power private network

open access: yesDianxin kexue, 2022
Some main aspects of 5G power private network including network architecture, key technologies and the analysis on the existing key issues aiming to large-scale commercial use were intorduced.Firstly, the service characteristics of power grid was combed ...
Rong WANG   +4 more
doaj   +2 more sources

Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology

open access: yesMolecular Oncology, EarlyView.
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts   +8 more
wiley   +1 more source

Amyotrophic Lateral Sclerosis as a Multistep Process in the United States: A Population‐Based Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Amyotrophic lateral sclerosis (ALS) is a fatal, progressive neurodegenerative disease that typically results in death within 3–5 years from symptom onset. However, little is known about the environmental exposures, clinical aspects, or social determinants of health factors that may be associated with the disease.
Jasmine Berry   +7 more
wiley   +1 more source

Remaining Burden of Spinal Muscular Atrophy Among Treated Patients: A Survey of Patients and Caregivers

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Spinal muscular atrophy (SMA) significantly impacts motor function. This study aimed to assess the persistent burden and unmet needs among currently treated patients with SMA and their caregivers. Methods Two complementary web‐based surveys were distributed in August 2024 among patients with SMA and their caregivers.
Julie A. Parsons   +8 more
wiley   +1 more source

New sequences from the generalized Pell p−numbers and mersenne numbers and their application in cryptography

open access: yesAIMS Mathematics
This paper presents the generalized Pell $ p- $numbers and provides some related results. A new sequence is defined using the characteristic polynomial of the Pell $ p- $numbers and generalized Mersenne numbers.
Elahe Mehraban   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy