Results 31 to 40 of about 405,500 (194)

Application value of contrast‐enhanced ultrasound in preoperative localization of microwave ablation for primary hyperparathyroidism

open access: yesJournal of Applied Clinical Medical Physics, Volume 23, Issue 12, December 2022., 2022
Abstract Background Ultrasonography (US) and 99mTechnetium‐sestamibi scintigraphy (99mTc‐MIBI) are currently first‐line imaging modalities to localize parathyroid adenomas with sensitivities of 80% and 84%, respectively. Therefore, finding other modalities to further improve the diagnostic accuracy for preoperative localization is critically needed ...
Fangyi Liu   +7 more
wiley   +1 more source

Dynamic Cryptography Integrated Secured Decentralized Applications with Blockchain Programming

open access: yesWasit Journal of Computer and Mathematics Science, 2022
Blocks and chains are the building blocks of the blockchain, which is a community network. Blocks and chains are two terms used to describe collections of data information.
Jamal Kh-Madhloom
doaj   +1 more source

Agri-Food Traceability Management using a RFID System with Privacy Protection [PDF]

open access: yes, 2007
In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in food, an efficient tracking and tracing system is required.
Bernardi, Paolo   +5 more
core   +2 more sources

A STUDY OF BILINEAR MAPS IN WIRELESS SENSOR NETWORKS

open access: yesICTACT Journal on Communication Technology, 2017
In the past, a large part of security requirements of wireless sensor networks (WSN) were fulfilled by symmetric cryptography systems. But, today by introduction of new needs in these networks and their security development, researchers of security and ...
Reza Alimoradi   +2 more
doaj   +1 more source

Quantum‐resistant anonymous identity‐based encryption with trable identities

open access: yesIET Information Security, 2022
Identity‐based encryption (IBE), introduced by Shamir, eliminates the need for public‐key infrastructure. The sender can simply encrypt a message by using the recipient's identity (such as email or IP address) without needing to look up the public key ...
Zi‐Yuan Liu   +4 more
doaj   +1 more source

An efficient certificateless blind signature scheme without bilinear pairing

open access: yesAnais da Academia Brasileira de Ciências, 2014
Recently, the certificateless public key cryptography (CLPKC) has been studied widely since it could solve both of the certificate management problem in traditional public key cryptography (TPKC) and the key escrow problem in the identity-based public ...
GUOFAGN DONG   +3 more
doaj   +1 more source

A potential biomarker of cognitive impairment: The olfactory dysfunction and its genes expression

open access: yesAnnals of Clinical and Translational Neurology, Volume 9, Issue 12, Page 1884-1897, December 2022., 2022
Abstract Objective Accumulation evidence has reported that olfactory impairment may be an essential clinical marker and predictor of mild cognitive impairment or Alzheimer's disease. Method Participants were enrolled in the population‐based, prospective study in Fuxin county, Liaoning province, China between 2019 and 2021.
Jiayi Song   +11 more
wiley   +1 more source

The [2Fe‐2S] cluster of mitochondrial outer membrane protein mitoNEET has an O2‐regulated nitric oxide access tunnel

open access: yesFEBS Letters, EarlyView.
The mitochondrial outer membrane iron–sulphur ([Fe‐S]) protein mitoNEET is a target of the type‐2 diabetes drug pioglitazone. Its unknown molecular function is linked to respiratory complex activity and mitochondrial function. We discovered that O2 protects the mitoNEET [2Fe‐2S] cluster against NO oxidation and desensitization towards reduction by H2S.
Thao Nghi Hoang   +9 more
wiley   +1 more source

Encryption of Data using Elliptic Curve over Finite fields [PDF]

open access: yesInternational Journal of Distributed and Parallel Sysstems(IJDPS) Vol.3 No.1 January 2012, 2012
Cryptography is the study of techniques for ensuring the secrecy and authentication of the information. Public-key encryption schemes are secure only if the authenticity of the public-key is assured. Elliptic curve arithmetic can be used to develop a variety of elliptic curve cryptography (ECC) schemes including key exchange, encryption and digital ...
arxiv   +1 more source

Quantum asymmetric cryptography with symmetric keys

open access: yes, 2008
Based on quantum encryption, we present a new idea for quantum public-key cryptography (QPKC) and construct a whole theoretical framework of a QPKC system.
A. Kawachi   +41 more
core   +1 more source

Home - About - Disclaimer - Privacy