Results 71 to 80 of about 3,071,363 (328)

Secure and efficient two-party ECDSA signature scheme

open access: yesTongxin xuebao, 2021
To solve the easy disclosure of signature private key and excessive concentration of signature rights, a secure and efficient two-party ECDSA signature scheme was proposed for the blockchain based network trading systems.By pre-computing one-time pad ...
Jing WANG, Libing WU, Min LUO, Debiao HE
doaj   +2 more sources

Private Schooling in the U.S.: Expenditures, Supply, and Policy Implications [PDF]

open access: yes, 2009
This report provides a first-of-its-kind descriptive summary of private school expenditures. It includes comparisons of expenditures among different types and affiliations of private schools, and it also compares those expenditures with public school ...
Bruce D. Baker
core   +1 more source

Lived and care experiences of chronic musculoskeletal shoulder pain in Australian adults: A qualitative study

open access: yesArthritis Care &Research, Accepted Article.
Objectives Australian evidence on lived and care experiences of chronic musculoskeletal shoulder pain (CMSP), irrespective of disorder classification or disease, is limited. However, such evidence is important for person‐centred care and informing local service pathways and care guidelines or standards.
Sonia Ranelli   +8 more
wiley   +1 more source

Join Public Key and Private Key for Encrypting Data

open access: yes, 2021
Data security is a major issue in the digital world. Cryptography is the most use technique for data security. Cryptography is one of the principle of protection of digital data. Encryption and decryption ensure the data confidentiality. The effectiveness of the encryption security depends on the key management, while RSA algorithm uses two keys ...
Md Helal Hossen   +2 more
openaire   +2 more sources

The Economic Burden of Rheumatoid Arthritis in Low‐ and Middle‐Income Countries: Systematic Review and Meta‐Analysis

open access: yesArthritis Care &Research, Accepted Article.
Objective The aim of this systematic review was to synthesise the economic impact of rheumatoid arthritis (RA) on households, health systems, and society in low‐ and middle‐income countries (LMICs). Methods Electronic databases such as PubMed, Web of Science, and CINAHL were searched using keywords related to RA and cost of illness.
Tadesse Gebrye   +6 more
wiley   +1 more source

Private quantum codes: introduction and connection with higher rank numerical ranges

open access: yes, 2013
We give a brief introduction to private quantum codes, a basic notion in quantum cryptography and key distribution. Private code states are characterized by indistinguishability of their output states under the action of a quantum channel, and we show ...
Kribs, D. W., Plosker, S.
core   +1 more source

Hip morphology‐based osteoarthritis risk prediction models: development and external validation using individual participant data from the World COACH Consortium

open access: yesArthritis Care &Research, Accepted Article.
Objectives This study aims to develop hip morphology‐based radiographic hip osteoarthritis (RHOA) risk prediction models and investigates the added predictive value of hip morphology measurements and the generalizability to different populations. Methods We combined data from nine prospective cohort studies participating in the World COACH consortium ...
Myrthe A. van den Berg   +26 more
wiley   +1 more source

Physician Referral Patterns to Physical Therapists for Managing Knee Osteoarthritis: A Retrospective Analysis of Electronic Health Records from an Integrated Health System

open access: yesArthritis Care &Research, Accepted Article.
Objectives This study aims to describe the frequency and timing of physician referrals to physical therapists (PT) and other treatments prescribed over 12 months in patients with recent onset of knee osteoarthritis (KOA). The study also aims to identify determinants of early PT referrals.
Samannaaz S. Khoja   +4 more
wiley   +1 more source

On the Impossibility of Private Key Cryptography with Weakly Random Keys [PDF]

open access: yes, 2007
The properties of weak sources of randomness have been investigated in many contexts and using several models of weakly random behaviour. For two such models, developed by Santha and Vazirani, and Chor and Goldreich, it is known that the output from one such source cannot be "compressed" to produce nearly random bits.
Benny Pinkas, James L. McInnes
openaire   +2 more sources

Recovering Private Keys Generated with Weak PRNGs [PDF]

open access: yes, 2013
Suppose that the private key of discrete logarithm-based or factoring-based public-key primitive is obtained by concatenating the outputs of a linear congruential generator. How seriously is the scheme weakened as a result? While linear congruential generators are cryptographically very weak "pseudorandom" number generators, the answer to that question
Fouque, Pierre-Alain   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy