Results 101 to 110 of about 80,772 (303)
Impossibility of Three Pass Protocol using Public Abelian Groups
Key transport protocols are designed to transfer a secret key from an initiating principal to other entities in a network. The three-pass protocol is a key transport protocol developed by Adi Shamir in 1980 where Alice wants to transport a secret message
Kılıç, Adnan+2 more
core
ABSTRACT Objective To identify metabolic patterns in the brain and musculoskeletal system of stiff person syndrome spectrum disorders (SPSD) patients over time using PET imaging and evaluate the impact of immune therapy on metabolic activity as a surrogate for treatment response.
Munther M. Queisi+4 more
wiley +1 more source
ABSTRACT Objective Prognostication of disease course and prediction of treatment response in multiple sclerosis is an unmet need. We compared the performance of serum neurofilament light chain Z scores (age‐ and BMI‐adjusted) with absolute concentrations for the prediction of response to disease‐modifying therapy.
Maximilian Einsiedler+43 more
wiley +1 more source
Hardware architectures for public key cryptography [PDF]
Lejla Batina+3 more
openalex +1 more source
ABSTRACT Objective To investigate the overall use of prescription medications among individuals with multiple sclerosis compared to the general population, with a focus on treatments beyond disease‐modifying therapies. Methods We conducted a nationwide, registry‐based study in Denmark.
Josefine Windfeld‐Mathiasen+4 more
wiley +1 more source
A SECURE CHANNEL PROTOCOL FOR MULTI-APPLICATION SMART CARDS BASED ON PUBLIC KEY CRYPTOGRAPHY [PDF]
Konstantinos Markantonakis, Keith Mayes
openalex +1 more source
ICU‐EEG Pattern Detection by a Convolutional Neural Network
ABSTRACT Objective Patients in the intensive care unit (ICU) often require continuous EEG (cEEG) monitoring due to the high risk of seizures and rhythmic and periodic patterns (RPPs). However, interpreting cEEG in real time is resource‐intensive and heavily relies on specialized expertise, which is not always available.
Giulio Degano+5 more
wiley +1 more source
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography [PDF]
David J. Malan+2 more
openalex +1 more source
As many patients with inflammatory arthritis (IA) have chronic pain, understanding how to best assess and manage pain in IA is a priority. Comorbid depression is prevalent in adults with IA, affecting 15% to 39% of people. Although pain and depression are thought to be associated in IA, this concept is largely based on cross‐sectional data.
Natasha Cox+3 more
wiley +1 more source
A new public key cryptography using generalized Fibonacci matrices [PDF]
This work presents a new public key cryptography encryption-decryption scheme based on generalized Fibonacci matrices and the Hill cipher. This scheme proposes using Fibonacci sequences under prime modulo for key establishment.
Jyoti Panchal+2 more
doaj