Results 131 to 140 of about 20,376 (274)
Provably secure certificateless aggregate signature scheme in wireless roaming authentication
Certificateless aggregate signature (CLAS) schemes have been widely applied in resource-constrained wireless mobile networks,because they could not only realize batch validation but also solve the certificate management and key escrow problems.It was ...
Zhi-yan XU +3 more
doaj
Should Dermatologists Recommend Direct‐to‐Consumer App‐Based Remote Diagnostics? An Ethical Analysis
ABSTRACT Background Dermatology patients still face barriers in accessing timely specialist care. As direct‐to‐consumer (DTC) apps for remote dermatological diagnostics proliferate, guidance is lacking. While promising efficiency and efficacy, their clinical—and ethical—legitimacy is not yet well established.
Sonja Mathes +9 more
wiley +1 more source
Correcting the security definition of the Bellare-Rogaway 3PKD model
A flaw lied in the security definition of the Bellare-Rogaway 3PKD model,which was proposed by Bellare and Rogaway for three-party key distribution in 1995,was discovered.To reveal it,a new three-party key distribution proto-col P-Flaw was proposed.The ...
LIU Jun1 +3 more
doaj
ABSTRACT The age‐related decline in accommodative function after the age of 50 years corresponds with an increasing incidence of primary angle‐closure disease (PACD); however, the interaction between this decline and PACD remains unexamined. Additionally, refractive error‐accommodation associations in elderly individuals, which are critical for PACD ...
Feng‐Rui Yang +6 more
wiley +1 more source
Abstract Purpose Unicompartmental knee arthroplasty (UKA) offers benefits over total knee arthroplasty (TKA), but some studies indicated higher revision rates, often involving conversion to TKA. The infection risk associated with UKA to TKA conversion compared to primary TKA is not definitively established.
Maximilian Budin +7 more
wiley +1 more source
Data‐driven redefinition of early relapse in pediatric T‐ALL using hazard modeling, cumulative incidence, and time‐dependent HR across 1533 patients in three independent cohorts identifies 15 months as the optimal threshold. By integrating temporal risk metrics and external validation, this study provides evidence for POD ≤ 15 months as a data‐driven ...
Na Zhang +6 more
wiley +1 more source
Analysis and improvement of a password-based authenticated key exchange protocol
The security of a recently proposed password-based authenticated key exchange protocol was analyzed. Al- though it was provably secure in the standard model, it was vulnerable to reflection attacks.
SHU Jian1, XU Chun-xiang1
doaj
TopoMAS: Large Language Model Driven Topological Materials Multi‐Agent System
TopoMAS is an interactive multi‐agent framework that revolutionizes topological materials discovery through human–AI collaborative intelligence. The system integrates natural language processing, knowledge retrieval from literature and databases, crystal structure generation, and automated first‐principles calculations within a unified workflow.
Baohua Zhang +5 more
wiley +1 more source
A New Efficient and Provably Secure Certificateless Signature Scheme Without Bilinear Pairings for the Internet of Things. [PDF]
Wei Z, Liu X, Zhao H, Li Z, Liu B.
europepmc +1 more source
Multi‐Agent Reinforcement Learning for Joint Police Patrol and Dispatch
ABSTRACT Police patrol units need to split their time between performing preventive patrol and being dispatched to serve emergency incidents. In the existing literature, patrol and dispatch decisions are often studied separately. We consider joint optimization of these two decisions to improve police operations efficiency and reduce response time to ...
Matthew Repasky, He Wang, Yao Xie
wiley +1 more source

