Results 61 to 70 of about 243,777 (279)
ModHE: Modular Homomorphic Encryption Using Module Lattices
The promising field of homomorphic encryption enables functions to be evaluated on encrypted data and produce results for the same computations done on plaintexts.
Anisha Mukherjee +6 more
doaj +1 more source
ABSTRACT Objective People with epilepsy (PWE) may experience cognitive deficits but fail to undergo formal evaluation. This study compares cognitive status between PWE and healthy controls in the West African Republic of Guinea. Methods A cross‐sectional, case–control study was conducted in sequential recruitment phases (July 2024–July 2025) at Ignace ...
Maya L. Mastick +14 more
wiley +1 more source
ABSTRACT Objective Glioma recurrence severely impacts patient prognosis, with current treatments showing limited efficacy. Traditional methods struggle to analyze recurrence mechanisms due to challenges in assessing tumor heterogeneity, spatial dynamics, and gene networks.
Lei Qiu +10 more
wiley +1 more source
Remote Assessment of Ataxia Severity in SCA3 Across Multiple Centers and Time Points
ABSTRACT Objective Spinocerebellar ataxia type 3 (SCA3) is a genetically defined ataxia. The Scale for Assessment and Rating of Ataxia (SARA) is a clinician‐reported outcome that measures ataxia severity at a single time point. In its standard application, SARA fails to capture short‐term fluctuations, limiting its sensitivity in trials.
Marcus Grobe‐Einsler +20 more
wiley +1 more source
Context-sensitive Spelling Correction Using Google Web 1T 5-Gram Information
In computing, spell checking is the process of detecting and sometimes providing spelling suggestions for incorrectly spelled words in a text. Basically, a spell checker is a computer program that uses a dictionary of words to perform spell checking. The
Alwani, Mohammad, Bassil, Youssef
core +2 more sources
The integration of communication technologies has made authentication a crucial security element in the cyberphysical power system (CPPS) scenario. Since it offers a range of security services, such as credentials privacy, session-key (SK) security, and
Xue Li +4 more
doaj +1 more source
Improved Lattice-Based Signcryption in the Standard Model
Signcryption is a basic cryptographic primitive that simultaneously captures the functions of encryption and signature. To realize comprehensive information security against quantum computing attacks, lattice-based signcryption schemes have been ...
Xiaopeng Yang +3 more
doaj +1 more source
Hardness of Module-LWE with Semiuniform Seeds from Module-NTRU
The module learning with errors (MLWE) problem has attracted significant attention and has been widely used in building a multitude of lattice-based cryptographic primitives. The hardness of the MLWE problem has been established for several variants, but
Wenjuan Jia, Jiang Zhang, Baocang Wang
doaj +1 more source
ABSTRACT Introduction Progressive Supranuclear Palsy (PSP) is a neurodegenerative ‘tauopathy’ with predominating pathology in the basal ganglia and midbrain. Caudal tau spread frequently implicates the cerebellum; however, the pattern of atrophy remains equivocal.
Chloe Spiegel +8 more
wiley +1 more source
Configurable Encryption and Decryption Architectures for CKKS-Based Homomorphic Encryption
With the increasing number of edge devices connecting to the cloud for storage and analysis, concerns about security and data privacy have become more prominent.
Jaehyeok Lee, Phap Ngoc Duong, Hanho Lee
doaj +1 more source

