Results 91 to 100 of about 80,772 (303)

On the Security of Certificateless Signature Schemes

open access: yesInternational Journal of Distributed Sensor Networks, 2013
Wireless Sensor Network (WSN) has proved its presence in various real time applications and hence the security of such embedded devices is a vital issue. Certificateless cryptography is one of the recent paradigms to provide security.
Gaurav Sharma, Suman Bala, Anil K. Verma
doaj   +1 more source

BCS1L‐Associated Disease: 5′‐UTR Variant Shifts the Phenotype Towards Axonal Neuropathy

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objectives To investigate the consequences of a pathogenic missense variant (c.838C>T; p.L280F) and a 5′‐UTR regulatory variant (c.‐122G>T) in BCS1L on disease pathogenesis and to understand how regulatory variants influence disease severity and clinical presentation.
Rotem Orbach   +11 more
wiley   +1 more source

A Novel C19orf47‐AKT2 Chimeric RNA Generated by Cis‐Splicing of Adjacent Genes Is Associated With Glioblastoma Prognosis

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Malignant gliomas pose significant therapeutic challenges. This study aimed to identify and characterize a novel chimeric RNA in glioma and assess its clinical and functional significance for precision treatment. Methods The C19orf47‐AKT2 chimeric RNAs were identified through RNA sequencing and validated by polymerase chain reaction.
Zihan Wang   +11 more
wiley   +1 more source

The Road Not Taken: Misclassifying an Anti‐Seizure Medication as a Failure

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To quantify how often anti‐seizure medications (ASMs) appear ineffective yet provide benefit when considering seizure frequency (SF) variability. Methods We used the CHOCOLATES seizure diary simulator to generate 100,000 patient seizure diaries that reflect natural SF variation in a heterogeneous population.
Christopher N. Henry   +1 more
wiley   +1 more source

RSA: Dagli anni '70 al giorno d'oggi

open access: yesAtti della Accademia Peloritana dei Pericolanti : Classe di Scienze Fisiche, Matematiche e Naturali, 2006
In this note, after a brief historical excursus, we describe the revolution in cryptography of the 70es, due to the introduction of public key cryptography and the RSA algorithm. We also consider some contemporary applications of this algorithm.
Pellegrini, S
doaj   +1 more source

Quantitative Shape Irregularity and Density Heterogeneity Predict Hematoma Expansion in Patients With Intracerebral Hemorrhage

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Purpose This study aimed to explore the association between quantitative shape irregularity and density heterogeneity of hematomas and hematoma expansion (HE) for intracerebral hemorrhage (ICH) patients. Methods This cohort study included patients arriving within 24 h of symptom onset between August 2021 and July 2022 as the derivation cohort ...
Zeqiang Ji   +11 more
wiley   +1 more source

On the Cryptanalysis of Public-Key Cryptography [PDF]

open access: yes, 2012
Nowadays, the most popular public-key cryptosystems are based on either the integer factorization or the discrete logarithm problem. The feasibility of solving these mathematical problems in practice is studied and techniques are presented to speed-up the underlying arithmetic on parallel architectures.
openaire   +1 more source

Associations of Stroke With Risk of Epilepsy: Results From the Atherosclerosis Risk in Communities (ARIC) Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To estimate the risk of epilepsy associated with stroke in a community‐based cohort, with consideration of stroke type, number, and severity. Methods Data from 15,100 Atherosclerosis Risk in Communities (ARIC) Study participants without stroke at baseline (1987–1989) were analyzed through 12/31/2022.
Jiping Zhou   +11 more
wiley   +1 more source

High-Performance NTRU Accelerator Using a Direct Memory Access Controller

open access: yesIEEE Access
NTRU is a well-established and widely used public-key cryptography. It has been standardized in IEEE Std1363.1 and X9.98, and its variant was submitted to the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC ...
Seon Bhin Kim   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy