Results 171 to 180 of about 63,410 (288)
Privacy-preserving AUC computation in distributed machine learning with PHT-meDIC. [PDF]
de Arruda Botelho M +4 more
europepmc +1 more source
ABSTRACT Preliminary geophysical investigations are a cost‐effective and efficient way to screen archaeological sites and locate buried structures. Ground‐penetrating radar (GPR) is one of the most widely used methods for archaeological prospection, but in some sites, it cannot be employed effectively due to the presence of clay or other electrically ...
Andrea Vergnano +5 more
wiley +1 more source
Quantum cryptography and data protection for medical devices before and after they meet Q-Day. [PDF]
Freyer O +3 more
europepmc +1 more source
Abstract The first experience of medical students in the dissecting room (DR) likely influences professional identity formation (PIF). Sparse data exist exploring how exposure to the DR and body donors without undertaking dissection influences PIF, or how culture may influence this experience.
Jacob Madgwick +2 more
wiley +1 more source
A secure group-based authentication protocol for IoVT in 5G-enabled smart transportation and road safety systems. [PDF]
Singh G +3 more
europepmc +1 more source
Encryption’s Importance to Economic and Infrastructure Security [PDF]
McNulty, F. Lynn
core +1 more source
System for enhancing the security of private data using public-key cryptography
Danylo Kostyshyn, Yevheniya Levus
openalex +1 more source
Animal Models and Experimental Medicine, EarlyView.
Asian Federation of Laboratory Animal Science Associations (AFLAS)
wiley +1 more source
Supporting doctors' professional identity development through specialist training
Abstract Anatomy‐centric specialties such as surgery, radiology, and anatomical pathology (AP) have workforce shortages, with attrition during the training phase proposed as a contributing factor. Current understanding of the reasons behind trainee attrition is limited, and there have been calls to increase the depth and richness of research in this ...
Shemona Y. Rozario +3 more
wiley +1 more source
Quantum secured blockchain framework for enhancing post quantum data security. [PDF]
Reddy NR +5 more
europepmc +1 more source

