Results 31 to 40 of about 85,671 (284)

A STUDY OF BILINEAR MAPS IN WIRELESS SENSOR NETWORKS

open access: yesICTACT Journal on Communication Technology, 2017
In the past, a large part of security requirements of wireless sensor networks (WSN) were fulfilled by symmetric cryptography systems. But, today by introduction of new needs in these networks and their security development, researchers of security and ...
Reza Alimoradi   +2 more
doaj   +1 more source

Evaluating the Genetic Overlap Between Congenital Heart Disease and Neuroblastoma Risk

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Children with congenital heart disease (CHD) have elevated neuroblastoma (NB) risk, potentially due to shared neural crest origins. We analyzed rare exonic de novo single‐nucleotide variants in 702 CHD and 454 NB trios from the Neuroblastoma Epidemiology in North America Study, Gabriella Miller Kids First Program, and a published cohort. Seven
Ji Yun Tark   +7 more
wiley   +1 more source

An efficient certificateless blind signature scheme without bilinear pairing

open access: yesAnais da Academia Brasileira de Ciências, 2014
Recently, the certificateless public key cryptography (CLPKC) has been studied widely since it could solve both of the certificate management problem in traditional public key cryptography (TPKC) and the key escrow problem in the identity-based public ...
GUOFAGN DONG   +3 more
doaj   +1 more source

Patient‐Level Barriers and Facilitators to Inpatient Physical Therapy in Adolescents and Young Adults With a Hematological Malignancy: A Qualitative Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Despite their increased risk for functional impairment resulting from cancer and its treatments, few adolescents and young adults (AYAs) with a hematological malignancy receive the recommended or therapeutic dose of exercise per week during inpatient hospitalizations.
Jennifer A. Kelleher   +8 more
wiley   +1 more source

Transitory Master Key Transport Layer Security for WSNs

open access: yesIEEE Access, 2020
Security approaches in Wireless Sensor Networks (WSNs) are normally based on symmetric cryptography. Instead of symmetric encryption, some alternative approaches have been developed by using public-key cryptography. However, the higher computational cost
Mattia Griotti   +2 more
doaj   +1 more source

Adaptive authentication and key agreement mechanism for future cellular systems [PDF]

open access: yes, 2006
Since the radio medium can be accessed by anyone, authentication of users is a very important element of a mobile network. Nowadays, in GSM/GPRS a challenge response protocol is used to authenticate the user to the mobile network.
Dimitriou, T., Komninos, N.
core  

LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments

open access: yes, 2008
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile ...
Beheshti, A. A., Toorani, M.
core   +3 more sources

Psychological Safety Among Interprofessional Pediatric Oncology Teams in Germany: A Nationwide Survey

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Psychological safety (PS) is essential for teamwork, communication, and patient safety in complex healthcare environments. In pediatric oncology, interprofessional collaboration occurs under high emotional and organizational demands. Low PS may increase stress, burnout, and adverse events.
Alexandros Rahn   +4 more
wiley   +1 more source

Predicting the Future Burden of Renal Replacement Therapy in Türkiye Using National Registry Data and Comparative Modeling Approaches

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Background Chronic kidney disease is a growing public health problem worldwide, and the number of patients requiring renal replacement therapy is steadily increasing. Türkiye has experienced a similar rise in both the incidence and prevalence of renal replacement therapy over the past decades; however, national‐level projections of future ...
Arzu Akgül   +2 more
wiley   +1 more source

Using decision problems in public key cryptography [PDF]

open access: yes, 2007
There are several public key establishment protocols as well as complete public key cryptosystems based on allegedly hard problems from combinatorial (semi)group theory known by now.
Shpilrain, Vladimir, Zapata, Gabriel
core   +3 more sources

Home - About - Disclaimer - Privacy