Results 91 to 100 of about 80,772 (303)
On the Security of Certificateless Signature Schemes
Wireless Sensor Network (WSN) has proved its presence in various real time applications and hence the security of such embedded devices is a vital issue. Certificateless cryptography is one of the recent paradigms to provide security.
Gaurav Sharma, Suman Bala, Anil K. Verma
doaj +1 more source
BCS1L‐Associated Disease: 5′‐UTR Variant Shifts the Phenotype Towards Axonal Neuropathy
ABSTRACT Objectives To investigate the consequences of a pathogenic missense variant (c.838C>T; p.L280F) and a 5′‐UTR regulatory variant (c.‐122G>T) in BCS1L on disease pathogenesis and to understand how regulatory variants influence disease severity and clinical presentation.
Rotem Orbach+11 more
wiley +1 more source
Public-key cryptography and password protocols [PDF]
Maurizio Kliban Boyarsky
openalex +1 more source
ABSTRACT Objective Malignant gliomas pose significant therapeutic challenges. This study aimed to identify and characterize a novel chimeric RNA in glioma and assess its clinical and functional significance for precision treatment. Methods The C19orf47‐AKT2 chimeric RNAs were identified through RNA sequencing and validated by polymerase chain reaction.
Zihan Wang+11 more
wiley +1 more source
The Road Not Taken: Misclassifying an Anti‐Seizure Medication as a Failure
ABSTRACT Objective To quantify how often anti‐seizure medications (ASMs) appear ineffective yet provide benefit when considering seizure frequency (SF) variability. Methods We used the CHOCOLATES seizure diary simulator to generate 100,000 patient seizure diaries that reflect natural SF variation in a heterogeneous population.
Christopher N. Henry+1 more
wiley +1 more source
RSA: Dagli anni '70 al giorno d'oggi
In this note, after a brief historical excursus, we describe the revolution in cryptography of the 70es, due to the introduction of public key cryptography and the RSA algorithm. We also consider some contemporary applications of this algorithm.
Pellegrini, S
doaj +1 more source
ABSTRACT Purpose This study aimed to explore the association between quantitative shape irregularity and density heterogeneity of hematomas and hematoma expansion (HE) for intracerebral hemorrhage (ICH) patients. Methods This cohort study included patients arriving within 24 h of symptom onset between August 2021 and July 2022 as the derivation cohort ...
Zeqiang Ji+11 more
wiley +1 more source
On the Cryptanalysis of Public-Key Cryptography [PDF]
Nowadays, the most popular public-key cryptosystems are based on either the integer factorization or the discrete logarithm problem. The feasibility of solving these mathematical problems in practice is studied and techniques are presented to speed-up the underlying arithmetic on parallel architectures.
openaire +1 more source
ABSTRACT Objective To estimate the risk of epilepsy associated with stroke in a community‐based cohort, with consideration of stroke type, number, and severity. Methods Data from 15,100 Atherosclerosis Risk in Communities (ARIC) Study participants without stroke at baseline (1987–1989) were analyzed through 12/31/2022.
Jiping Zhou+11 more
wiley +1 more source
High-Performance NTRU Accelerator Using a Direct Memory Access Controller
NTRU is a well-established and widely used public-key cryptography. It has been standardized in IEEE Std1363.1 and X9.98, and its variant was submitted to the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC ...
Seon Bhin Kim+2 more
doaj +1 more source