Results 201 to 210 of about 822,330 (361)
Secure and Reliable Fog-Enabled Architecture Using Blockchain With Functional Biased Elliptic Curve Cryptography Algorithm for Healthcare Services. [PDF]
Awasthi C, Awasthi SP, Mishra PK.
europepmc +1 more source
An overview of public key cryptography [PDF]
openaire +3 more sources
Relations between arithmetic geometry and public key cryptography
Gerhard Frey
openalex +1 more source
Hepatoblastoma, an aggressive childhood liver tumor, origins from malignant hepatoblast‐like cells. Single‐cell analysis reveals IGF2‐driven pathways promoting malignancy. Targeting these pathways offers promising treatments, with serum IGF2 as a potential diagnostic biomarker.
Miao Ding+12 more
wiley +1 more source
Preserving Privacy of Internet of Things Network with Certificateless Ring Signature. [PDF]
Zhang Y, Duan P, Li C, Zhang H, Ahmad H.
europepmc +1 more source
WITHDRAWN: Quantum cryptography: Public key distribution and coin tossing
Charles H. Bennett, Gilles Brassard
openalex +1 more source
Development of Public Key Cryptographic Algorithm Using Matrix Pattern for Tele-Ultrasound Applications [PDF]
Seung-Hyeok Shin+2 more
openalex +1 more source
A GRP78 nanobody‐directed immunotoxin suppresses cancer progression and metastasis by enhancing antitumor immunity via STING pathway activation, offering a pan‐cancer‐targeted approach and immunotherapy combination strategy. Abstract The lack of targetable antigens poses a significant challenge in developing effective cancer‐targeted therapies.
Huifang Wang+16 more
wiley +1 more source
Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing. [PDF]
Almotiri SH.
europepmc +1 more source
A new spin on quantum cryptography: Avoiding trapdoors and embracing public keys
Lawrence M. Ioannou, Michele Mosca
openalex +2 more sources