Results 81 to 90 of about 10,264,102 (368)

Plasma Proteomic Signatures for Alzheimer's Disease: Comparable Accuracy to ATN Biomarkers and Cross‐Platform Validation

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background There is growing recognition of the potential of plasma proteomics for Alzheimer's Disease (AD) risk assessment and disease characterization. However, differences between proteomics platforms introduce uncertainties regarding cross‐platform applicability.
Manyue Hu   +9 more
wiley   +1 more source

Secure and efficient two-party ECDSA signature scheme

open access: yesTongxin xuebao, 2021
To solve the easy disclosure of signature private key and excessive concentration of signature rights, a secure and efficient two-party ECDSA signature scheme was proposed for the blockchain based network trading systems.By pre-computing one-time pad ...
Jing WANG, Libing WU, Min LUO, Debiao HE
doaj   +2 more sources

General paradigm for distilling classical key from quantum states

open access: yes, 2008
We develop a formalism for distilling a classical key from a quantum state in a systematic way, expanding on our previous work on secure key from bound entanglement [K. Horodecki et. al., Phys. Rev. Lett. 94 (2005)].
Horodecki, Karol   +3 more
core   +1 more source

Network Localization of Fatigue in Multiple Sclerosis

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Fatigue is among the most common symptoms and one of the main factors determining the quality of life in multiple sclerosis (MS). However, the neurobiological mechanisms underlying fatigue are not fully understood. Here we studied lesion locations and their connections in individuals with MS, aiming to identify brain networks ...
Olli Likitalo   +12 more
wiley   +1 more source

Private Schooling in the U.S.: Expenditures, Supply, and Policy Implications [PDF]

open access: yes, 2009
This report provides a first-of-its-kind descriptive summary of private school expenditures. It includes comparisons of expenditures among different types and affiliations of private schools, and it also compares those expenditures with public school ...
Bruce D. Baker
core   +1 more source

Private quantum codes: introduction and connection with higher rank numerical ranges

open access: yes, 2013
We give a brief introduction to private quantum codes, a basic notion in quantum cryptography and key distribution. Private code states are characterized by indistinguishability of their output states under the action of a quantum channel, and we show ...
Kribs, D. W., Plosker, S.
core   +1 more source

The Economic Impacts of Covid-19: Evidence from a New Public Database Built Using Private Sector Data

open access: yes, 2020
We build a publicly available database that tracks economic activity at a granular level in real time using anonymized data from private companies.
Raj Chetty   +4 more
semanticscholar   +1 more source

Effectiveness and Safety of Nusinersen and Risdiplam in Spinal Muscular Atrophy: A Systematic Review

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Spinal Muscular Atrophy (SMA) is a rare genetic disorder marked by progressive muscle weakness and mobility loss. It has a profound physical, emotional and social impact on patients and caregivers, requiring comprehensive medical and supportive care.
Amin Mehrabian   +9 more
wiley   +1 more source

The Key Authority - Secure Key Management in Hierarchical Public Key Infrastructures

open access: yes, 2004
We model a private key`s life cycle as a finite state machine. The states are the key`s phases of life and the transition functions describe tasks to be done with the key.
Karatsiolis, V.   +2 more
core   +1 more source

Making the decoy-state measurement-device-independent quantum key distribution practically useful

open access: yes, 2016
The relatively low key rate seems to be the major barrier to its practical use for the decoy state measurement device independent quantum key distribution (MDIQKD). We present a 4-intensity protocol for the decoy-state MDIQKD that hugely raises the key
Wang, X. -B., Yu, Z. -W., Zhou, Y-H
core   +1 more source

Home - About - Disclaimer - Privacy