Results 61 to 70 of about 3,071,363 (328)
Signature schemes with a fuzzy private key [PDF]
In this paper, we introduce a new concept of digital signature that we call fuzzy signature, which is a signature scheme that uses a noisy string such as biometric data as a private key, but does not require user-specific auxiliary data (which is also called a helper string in the context of fuzzy extractors), for generating a signature.
Kenta Takahashi+4 more
openaire +2 more sources
Objective This study aimed to improve contraception and reproductive planning documentation within rheumatology providers’ notes at a single academic center. Methods Female patients aged 18 to 45 years with autoimmune inflammatory rheumatic diseases were identified, and chart review was performed for documentation of contraception and pregnancy ...
Benjamin Moon+6 more
wiley +1 more source
Fault attacks on authenticated encryption modes for GIFT
There are several authenticated encryption modes for block cipher GIFT in the NIST lightweight cryptography standardisation process. In this study, the authors research on the fault attacks on this kind of authenticated encryption modes and mainly ...
Shuai Liu, Jie Guan, Bin Hu
doaj +1 more source
Developing Public-Private Key Pairs Using Highly-Available Technology [PDF]
The investigation of IPv4 has investigated simulated annealing, and current trends suggest that the emulation of congestion control will soon emerge. In this paper, authors show the development of randomized algorithms.
Colson, O. (Orville)+3 more
core
On Dynamic Distribution of Private Keys over MANETs
Identity-Based cryptography has been proposed in mobile ad-hoc networks (MANETs) to provide security. However, the figure of the Private Key Generator (PKG) is not adequate in the MANET setting, since it may not be reachable by all nodes, can fail during the life-time of the protocol or can even be attacked, compromising the whole system.
Daza, Vanesa+2 more
openaire +3 more sources
Objective Our objective was to explore moderators and mediators influenced changes in pain and function in people with knee osteoarthritis (OA) receiving a new model of primary care service delivery (Optimizing Primary Care Management of Knee Osteoarthritis [PARTNER]), at 12 months (ACTRN: 12617001595303).
Abdolhay Farivar+12 more
wiley +1 more source
Anonymous and Adaptively Secure Revocable IBE with Constant Size Public Parameters [PDF]
In Identity-Based Encryption (IBE) systems, key revocation is non-trivial. This is because a user's identity is itself a public key. Moreover, the private key corresponding to the identity needs to be obtained from a trusted key authority through an ...
Chen, Jie+4 more
core
Objective Social determinants of health (SDoH) can impact outcomes but are not routinely screened for in US outpatient rheumatology clinics. This study determined the feasibility of routine point‐of‐care SDoH screening among patients with systemic lupus erythematosus (SLE) and associated barriers and facilitators at the physician, care team, and ...
S. Sam Lim+11 more
wiley +1 more source
The Guide to Developing Key Working aims to offer guidance to those involved in developing, managing and delivering key working for children and young people with special educational needs and disabilities, and their families.
Bardsley, Janet+2 more
core
Objective We assessed whether shared decision‐making (SDM), and patient acceptability, feasibility, and overall satisfaction with a computerized patient decision aid (PtDA) for patients with systemic lupus erythematosus (SLE), differs by PtDA setting, modality, and the viewing experience.
Jasvinder A. Singh+3 more
wiley +1 more source