Results 61 to 70 of about 63,410 (288)

Sex differences in medication discontinuation in axial spondyloarthritis.

open access: yesArthritis Care &Research, Accepted Article.
Objective We examined sex differences in medication discontinuation among patients with axial spondyloarthritis (axSpA) initiating tumor necrosis factor inhibitors (TNFi), interleukin‐17 inhibitors (IL‐17i), or Janus kinase inhibitors (JAKi). Methods Using data from the Rheumatology Informatics System for Effectiveness (RISE) Registry (2003–2025), we ...
Rachael Stovall   +9 more
wiley   +1 more source

Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages

open access: yesApplied Sciences, 2020
Beginning with the proposal of the McEliece cryptosystem in 1978, code-based cryptography has positioned itself as one of main categories in post-quantum cryptography (PQC).
ByeongGyu Park   +4 more
doaj   +1 more source

Pengamanan Data Informasi Menggunakan Kriptografi Klasik [PDF]

open access: yes, 2005
Kriptografi (cryptography) merupakan ilmu dan seni untuk menjaga pesan agar aman. (Cryptography is the art and science of keeping messages secure) “Crypto” berarti “secret” (rahasia) dan “graphy” berarti “writing” (tulisan).
Sasongko, J. (Jati)
core  

Evaluation of a novel EHR sidecar application to display RA clinical outcomes during clinic visits: results of a stepped‐wedge cluster randomized pragmatic trial

open access: yesArthritis Care &Research, Accepted Article.
Objective We developed a novel EHR sidecar application to visualize key rheumatoid arthritis (RA) outcomes, including disease activity, physical function, and pain, via a patient‐facing graphical interface designed for use during outpatient visits (“RA PRO dashboard”).
Gabriela Schmajuk   +16 more
wiley   +1 more source

Integrated semi‐quantum layered communication

open access: yesIET Quantum Communication
In recent times, secure quantum communication in layered networks has emerged as an important area of study. The authors harness the potential offered by multidimensional states in secure quantum communication with only one quantum participant and all ...
Rajni Bala   +2 more
doaj   +1 more source

A Decentralized Signcryption Scheme Based on CFL

open access: yesSensors
The rapid advancement of quantum computing technology poses a significant threat to conventional public key cryptographic infrastructure. The SM2 (state key cryptography algorithm no.
Leyi Shi, Mengting Liu
doaj   +1 more source

Fraction-Integer Mehod (FIM) for Calculating Multiplicative Inverse [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2004
Multiplicative inverse is a crucial operation in public key cryptography. Public key cryptography has given rise to such a need, in which we need to generate a related public/private pair of numbers, each of which is the inverse of the other.
Sattar Aboud
doaj  

Improving the security of LSB image steganography

open access: yesJOIV: International Journal on Informatics Visualization, 2019
Steganography is the technique of hiding secret data (message) within any media such as digital color image. In this paper we will merge steganography process with cryptography process in order to increase the security of the proposed method.
Jamil Al-Azzeh   +3 more
doaj   +1 more source

Advanced Flame Retardant Strategies and Fire Performance Assessment for Safer Photovoltaics in Buildings: A Two‐Part Review

open access: yesAdvanced Functional Materials, EarlyView.
The integration of photovoltaic (PV) systems into building structures introduces distinct fire risks with critical implications for occupant safety. This review examines the key fire hazards associated with PV implementation and explores mitigation strategies, including flame‐retardant additives.
Florian Ollagnon   +7 more
wiley   +1 more source

Securing the Data in Clouds with Hyperelliptic Curve Cryptography

open access: yes, 2014
In todays world, Cloud computing has attracted research communities as it provides services in reduced cost due to virtualizing all the necessary resources. Even modern business architecture depends upon Cloud computing .As it is a internet based utility,
Agrawal, Tanmay   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy