Results 61 to 70 of about 16,729,036 (330)

Patient‐Level Barriers and Facilitators to Inpatient Physical Therapy in Adolescents and Young Adults With a Hematological Malignancy: A Qualitative Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Despite their increased risk for functional impairment resulting from cancer and its treatments, few adolescents and young adults (AYAs) with a hematological malignancy receive the recommended or therapeutic dose of exercise per week during inpatient hospitalizations.
Jennifer A. Kelleher   +8 more
wiley   +1 more source

Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials

open access: yesIEEE Access, 2018
Most of the existing blind proxy re-signature schemes are designed based on the traditional public key cryptosystems, whose security relies on the hardness of big integer factoring, discrete logarithm, elliptic curve discrete logarithm, and so on ...
Li Huixian   +3 more
doaj   +1 more source

Yao’s millionaires’ problem and public-key encryption without computational assumptions

open access: yes, 2017
We offer efficient and practical solutions of Yao’s millionaires’ problem without using any one-way functions. Some of the solutions involve physical principles, while others are purely mathematical.
Grigoriev, D., Kish, L., Shpilrain, V.
core   +2 more sources

Will quantum computers be the end of public key encryption?

open access: yes, 2017
The emergence of practical quantum computers poses a significant threat to the most popular public key cryptographic schemes in current use. While we know that the well-understood algorithms for factoring large composites and solving the discrete ...
W. Buchanan, Alan Woodward
semanticscholar   +1 more source

Server-Aided Public Key Encryption With Keyword Search

open access: yesIEEE Transactions on Information Forensics and Security, 2016
Public key encryption with keyword search (PEKS) is a well-known cryptographic primitive for secure searchable data encryption in cloud storage. Unfortunately, it is inherently subject to the (inside) offline keyword guessing attack (KGA), which is ...
Rongmao Chen   +6 more
semanticscholar   +1 more source

Quantum walks public key cryptographic system [PDF]

open access: yesarXiv.org, 2015
Quantum Cryptography is a rapidly developing field of research that benefits from the properties of Quantum Mechanics in performing cryptographic tasks. Quantum walks are a powerful model for quantum computation and very promising for quantum information
Chrysoula Vlachou   +4 more
semanticscholar   +1 more source

Psychological Safety Among Interprofessional Pediatric Oncology Teams in Germany: A Nationwide Survey

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Psychological safety (PS) is essential for teamwork, communication, and patient safety in complex healthcare environments. In pediatric oncology, interprofessional collaboration occurs under high emotional and organizational demands. Low PS may increase stress, burnout, and adverse events.
Alexandros Rahn   +4 more
wiley   +1 more source

Predicting the Future Burden of Renal Replacement Therapy in Türkiye Using National Registry Data and Comparative Modeling Approaches

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Background Chronic kidney disease is a growing public health problem worldwide, and the number of patients requiring renal replacement therapy is steadily increasing. Türkiye has experienced a similar rise in both the incidence and prevalence of renal replacement therapy over the past decades; however, national‐level projections of future ...
Arzu Akgül   +2 more
wiley   +1 more source

Symbolic Plithogenic Numbers in RSA Cryptography: A Path to Post-Quantum Security

open access: yesIEEE Access
The RSA algorithm, with its strong mathematical foundation rooted in number theory and its wide range of applications in secure communication, is one of the most widely used public-key encryption methods.
Mehmet Merkepci   +2 more
doaj   +1 more source

Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage

open access: yesIEEE Open Journal of the Computer Society, 2020
In the past, the security of most public-key encryption or key encapsulation schemes is shown in an ideal model, where private keys, secret keys and random values are assumed to be absolutely secure to adversaries.
Jui-Di Wu   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy