Results 61 to 70 of about 243,777 (273)

Unraveling the Molecular Mechanisms of Glioma Recurrence: A Study Integrating Single‐Cell and Spatial Transcriptomics

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Glioma recurrence severely impacts patient prognosis, with current treatments showing limited efficacy. Traditional methods struggle to analyze recurrence mechanisms due to challenges in assessing tumor heterogeneity, spatial dynamics, and gene networks.
Lei Qiu   +10 more
wiley   +1 more source

Hardness of Module-LWE with Semiuniform Seeds from Module-NTRU

open access: yesIET Information Security, 2023
The module learning with errors (MLWE) problem has attracted significant attention and has been widely used in building a multitude of lattice-based cryptographic primitives. The hardness of the MLWE problem has been established for several variants, but
Wenjuan Jia, Jiang Zhang, Baocang Wang
doaj   +1 more source

Context-sensitive Spelling Correction Using Google Web 1T 5-Gram Information

open access: yes, 2012
In computing, spell checking is the process of detecting and sometimes providing spelling suggestions for incorrectly spelled words in a text. Basically, a spell checker is a computer program that uses a dictionary of words to perform spell checking. The
Alwani, Mohammad, Bassil, Youssef
core   +2 more sources

Post-quantum cryptographic hardware primitives [PDF]

open access: yes, 2020
The development and implementation of post-quantum cryptosystems have become a pressing issue in the design of secure computing systems, as general quantum computers have become more feasible in the last two years.
Agrawal, Rashmi   +3 more
core  

Remote Assessment of Ataxia Severity in SCA3 Across Multiple Centers and Time Points

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Spinocerebellar ataxia type 3 (SCA3) is a genetically defined ataxia. The Scale for Assessment and Rating of Ataxia (SARA) is a clinician‐reported outcome that measures ataxia severity at a single time point. In its standard application, SARA fails to capture short‐term fluctuations, limiting its sensitivity in trials.
Marcus Grobe‐Einsler   +20 more
wiley   +1 more source

Improved Lattice-Based Signcryption in the Standard Model

open access: yesIEEE Access, 2019
Signcryption is a basic cryptographic primitive that simultaneously captures the functions of encryption and signature. To realize comprehensive information security against quantum computing attacks, lattice-based signcryption schemes have been ...
Xiaopeng Yang   +3 more
doaj   +1 more source

Configurable Encryption and Decryption Architectures for CKKS-Based Homomorphic Encryption

open access: yesSensors, 2023
With the increasing number of edge devices connecting to the cloud for storage and analysis, concerns about security and data privacy have become more prominent.
Jaehyeok Lee, Phap Ngoc Duong, Hanho Lee
doaj   +1 more source

Brainstem and Cerebellar Volume Loss and Associated Clinical Features in Progressive Supranuclear Palsy

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Introduction Progressive Supranuclear Palsy (PSP) is a neurodegenerative ‘tauopathy’ with predominating pathology in the basal ganglia and midbrain. Caudal tau spread frequently implicates the cerebellum; however, the pattern of atrophy remains equivocal.
Chloe Spiegel   +8 more
wiley   +1 more source

Secure Authenticated Post-Quantum Key Agreement Scheme Based on Ring Learning with Errors for Cyber-Physical Power System

open access: yesElectrica
The integration of communication technologies has made authentication a crucial security element in the cyberphysical power system (CPPS) scenario. Since it offers a range of security services, such as credentials privacy, session-key (SK) security, and
Xue Li   +4 more
doaj   +1 more source

Design and Implementation of Constant-Round Dynamic Group Key Exchange from RLWE

open access: yesIEEE Access, 2020
Group Key Exchange (GKE) is required for secure group communication with high confidentiality. In particular, a trusted authority can handle issues that happen by the malicious actions of group members, but it is expensive to deploy and not suitable in a
Rakyong Choi   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy