Results 31 to 40 of about 405,500 (194)
Abstract Background Ultrasonography (US) and 99mTechnetium‐sestamibi scintigraphy (99mTc‐MIBI) are currently first‐line imaging modalities to localize parathyroid adenomas with sensitivities of 80% and 84%, respectively. Therefore, finding other modalities to further improve the diagnostic accuracy for preoperative localization is critically needed ...
Fangyi Liu+7 more
wiley +1 more source
Dynamic Cryptography Integrated Secured Decentralized Applications with Blockchain Programming
Blocks and chains are the building blocks of the blockchain, which is a community network. Blocks and chains are two terms used to describe collections of data information.
Jamal Kh-Madhloom
doaj +1 more source
Agri-Food Traceability Management using a RFID System with Privacy Protection [PDF]
In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in food, an efficient tracking and tracing system is required.
Bernardi, Paolo+5 more
core +2 more sources
A STUDY OF BILINEAR MAPS IN WIRELESS SENSOR NETWORKS
In the past, a large part of security requirements of wireless sensor networks (WSN) were fulfilled by symmetric cryptography systems. But, today by introduction of new needs in these networks and their security development, researchers of security and ...
Reza Alimoradi+2 more
doaj +1 more source
Quantum‐resistant anonymous identity‐based encryption with trable identities
Identity‐based encryption (IBE), introduced by Shamir, eliminates the need for public‐key infrastructure. The sender can simply encrypt a message by using the recipient's identity (such as email or IP address) without needing to look up the public key ...
Zi‐Yuan Liu+4 more
doaj +1 more source
An efficient certificateless blind signature scheme without bilinear pairing
Recently, the certificateless public key cryptography (CLPKC) has been studied widely since it could solve both of the certificate management problem in traditional public key cryptography (TPKC) and the key escrow problem in the identity-based public ...
GUOFAGN DONG+3 more
doaj +1 more source
A potential biomarker of cognitive impairment: The olfactory dysfunction and its genes expression
Abstract Objective Accumulation evidence has reported that olfactory impairment may be an essential clinical marker and predictor of mild cognitive impairment or Alzheimer's disease. Method Participants were enrolled in the population‐based, prospective study in Fuxin county, Liaoning province, China between 2019 and 2021.
Jiayi Song+11 more
wiley +1 more source
The mitochondrial outer membrane iron–sulphur ([Fe‐S]) protein mitoNEET is a target of the type‐2 diabetes drug pioglitazone. Its unknown molecular function is linked to respiratory complex activity and mitochondrial function. We discovered that O2 protects the mitoNEET [2Fe‐2S] cluster against NO oxidation and desensitization towards reduction by H2S.
Thao Nghi Hoang+9 more
wiley +1 more source
Encryption of Data using Elliptic Curve over Finite fields [PDF]
Cryptography is the study of techniques for ensuring the secrecy and authentication of the information. Public-key encryption schemes are secure only if the authenticity of the public-key is assured. Elliptic curve arithmetic can be used to develop a variety of elliptic curve cryptography (ECC) schemes including key exchange, encryption and digital ...
arxiv +1 more source
Quantum asymmetric cryptography with symmetric keys
Based on quantum encryption, we present a new idea for quantum public-key cryptography (QPKC) and construct a whole theoretical framework of a QPKC system.
A. Kawachi+41 more
core +1 more source