Results 61 to 70 of about 3,071,363 (328)

Signature schemes with a fuzzy private key [PDF]

open access: yesInternational Journal of Information Security, 2019
In this paper, we introduce a new concept of digital signature that we call fuzzy signature, which is a signature scheme that uses a noisy string such as biometric data as a private key, but does not require user-specific auxiliary data (which is also called a helper string in the context of fuzzy extractors), for generating a signature.
Kenta Takahashi   +4 more
openaire   +2 more sources

Improving Documentation Rates of Contraception and Reproductive Planning in Patients With Rheumatic Disease

open access: yesArthritis Care &Research, EarlyView.
Objective This study aimed to improve contraception and reproductive planning documentation within rheumatology providers’ notes at a single academic center. Methods Female patients aged 18 to 45 years with autoimmune inflammatory rheumatic diseases were identified, and chart review was performed for documentation of contraception and pregnancy ...
Benjamin Moon   +6 more
wiley   +1 more source

Fault attacks on authenticated encryption modes for GIFT

open access: yesIET Information Security, 2022
There are several authenticated encryption modes for block cipher GIFT in the NIST lightweight cryptography standardisation process. In this study, the authors research on the fault attacks on this kind of authenticated encryption modes and mainly ...
Shuai Liu, Jie Guan, Bin Hu
doaj   +1 more source

Developing Public-Private Key Pairs Using Highly-Available Technology [PDF]

open access: yes, 2018
The investigation of IPv4 has investigated simulated annealing, and current trends suggest that the emulation of congestion control will soon emerge. In this paper, authors show the development of randomized algorithms.
Colson, O. (Orville)   +3 more
core  

On Dynamic Distribution of Private Keys over MANETs

open access: yesElectronic Notes in Theoretical Computer Science, 2007
Identity-Based cryptography has been proposed in mobile ad-hoc networks (MANETs) to provide security. However, the figure of the Private Key Generator (PKG) is not adequate in the MANET setting, since it may not be reachable by all nodes, can fail during the life-time of the protocol or can even be attacked, compromising the whole system.
Daza, Vanesa   +2 more
openaire   +3 more sources

Moderators and Mediators of Pain and Function Outcomes in a New Service Delivery Model for Management of Knee Osteoarthritis in Primary Care: Secondary Exploratory Analysis of a Randomized Controlled Trial

open access: yesArthritis Care &Research, EarlyView.
Objective Our objective was to explore moderators and mediators influenced changes in pain and function in people with knee osteoarthritis (OA) receiving a new model of primary care service delivery (Optimizing Primary Care Management of Knee Osteoarthritis [PARTNER]), at 12 months (ACTRN: 12617001595303).
Abdolhay Farivar   +12 more
wiley   +1 more source

Anonymous and Adaptively Secure Revocable IBE with Constant Size Public Parameters [PDF]

open access: yes, 2012
In Identity-Based Encryption (IBE) systems, key revocation is non-trivial. This is because a user's identity is itself a public key. Moreover, the private key corresponding to the identity needs to be obtained from a trusted key authority through an ...
Chen, Jie   +4 more
core  

Screening for Social Determinants of Health in Patients With Systemic Lupus Erythematosus: A Point‐of‐Care Feasibility Study

open access: yesArthritis Care &Research, EarlyView.
Objective Social determinants of health (SDoH) can impact outcomes but are not routinely screened for in US outpatient rheumatology clinics. This study determined the feasibility of routine point‐of‐care SDoH screening among patients with systemic lupus erythematosus (SLE) and associated barriers and facilitators at the physician, care team, and ...
S. Sam Lim   +11 more
wiley   +1 more source

Developing Key Working [PDF]

open access: yes, 2014
The Guide to Developing Key Working aims to offer guidance to those involved in developing, managing and delivering key working for children and young people with special educational needs and disabilities, and their families.
Bardsley, Janet   +2 more
core  

Where, how, and how much? A multicenter cohort study of the relationship between lupus decision aid modality, place of administration, interruption and viewing completeness and patient‐reported outcomes

open access: yesArthritis Care &Research, Accepted Article.
Objective We assessed whether shared decision‐making (SDM), and patient acceptability, feasibility, and overall satisfaction with a computerized patient decision aid (PtDA) for patients with systemic lupus erythematosus (SLE), differs by PtDA setting, modality, and the viewing experience.
Jasvinder A. Singh   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy