Results 101 to 110 of about 158,618 (286)

Cryptanalysis of LKK Proxy Signature [PDF]

open access: yes, 2006
A strong proxy signature scheme [7] based on Schnorr’s scheme was proposed by B. Lee et al. in 2001. In this paper we show that in the forementioned scheme, original signer may misuse a proxy signer’s signature of a message M to forge the proxy signer’s normal signature of M.
Zheng Dong, Liu Shengli, Chen Kefei
openaire   +1 more source

Divergent Responses of Bacterial Communities to Permafrost Degradation and Their Associations With Carbon Across Vertical Profiles

open access: yesAdvanced Science, EarlyView.
Bacterial α‐diversity decreases, but stochasticity and community stability increase across the 15 m‐depth vertical profiles and along the degraded gradient within the active layer. The abundance and interaction of core taxa mainly control community stability in the active and permafrost layers, respectively.
Shengyun Chen   +13 more
wiley   +1 more source

Factoring based proxy signature schemes

open access: yesJournal of Computational and Applied Mathematics, 2006
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xue, Qingshui, Cao, Zhenfu
openaire   +1 more source

The Mitochondrial Guardian α‐Amyrin Mitigates Alzheimer's Disease Pathology via Modulation of the DLK‐SARM1‐ULK1 Axis

open access: yesAdvanced Science, EarlyView.
Dietary habits play a key role in chronic diseases, and higher annual consumption of fruit and vegetable may lower risk of dementia. Artificial intelligence predicts the lipid‐like compound α‐Amyrin (αA) from plants with edible peels as a drug candidate against Alzheimer's disease.
Shu‐Qin Cao   +36 more
wiley   +1 more source

SiCmiR Atlas: Single‐Cell miRNA Landscape Reveals Hub‐miRNA and Network Signatures in Human Cancers

open access: yesAdvanced Science, EarlyView.
SiCmiR predicts mature miRNA activity at single‐cell resolution using only 977 landmark genes, enabling scalable reconstruction of miRNA landscapes across diverse tissues and disease contexts. The SiCmiR Atlas integrates 9.36 million cells with analytical tools for hub‐miRNA discovery, biomarker prioritization, and regulatory network interrogation ...
Xiao‐Xuan Cai   +12 more
wiley   +1 more source

Dual-proxy key-based threshold signature scheme for ship ad-hoc network

open access: yesTongxin xuebao, 2018
In order to solve the problem of message authentication under the conditions of the ship ad-hoc network (SANET),a signature scheme that does not depend on trusted certificate authorities and tamper-proof devices (TPD) was proposed by using the threshold ...
Ming XU, Xuru LI, Chaobin LIU, Yao MA
doaj   +2 more sources

A Mediated Definite Delegation Model allowing for Certified Grid Job Submission

open access: yes, 2011
Grid computing infrastructures need to provide traceability and accounting of their users" activity and protection against misuse and privilege escalation.
Betev, Latchezar   +3 more
core  

Real‐Time In Vivo Monitoring of Anastomotic Intestinal Ischemia Using Implantable Resorbable Organic Sensors

open access: yesAdvanced Science, EarlyView.
Resorbable impedance sensors are successfully implanted into porcine small intestinal anastomoses. Impedance was recorded for 2 hours prior, and 2 hours following ischemia induction, and a significant drop in tissue impedance was observed. Abstract Anastomotic failure remains one of the most severe complications in gastrointestinal surgery.
Dennis Wahl   +12 more
wiley   +1 more source

[[alternative]]The Design of Group-Oriented Proxy Signature Schemes and Proxy Authenticated Encryption Shcemes (II) [PDF]

open access: yes
計畫編號:NSC90-2213-E032-025研究期間:200108~200207研究經費:318,000[[sponsorship ...
黃心嘉
core  

High‐Fidelity Synthetic Data Replicates Clinical Prediction Performance in a Million‐Patient Diabetes Cohort

open access: yesAdvanced Science, EarlyView.
This study generates high‐fidelity synthetic longitudinal records for a million‐patient diabetes cohort, successfully replicating clinical predictive performance. However, deeper analysis reveals algorithmic biases and trajectory inconsistencies that escape standard quality metrics. These findings challenge current validation norms, demonstrating why a
Francisco Ortuño   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy