Results 31 to 40 of about 600,761 (285)

Two attacks on a sensor network key distribution scheme of Cheng and Agrawal

open access: yesJournal of Mathematical Cryptology, 2008
A sensor network key distribution scheme for hierarchical sensor networks was recently proposed by Cheng and Agrawal. A feature of their scheme is that pairwise keys exist between any pair of high-level nodes (which are called cluster heads) and between ...
Paterson M. B., Stinson D. R.
doaj   +1 more source

Sickle Cell Disease Is an Inherent Risk for Asthma in a Sibling Comparison Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction Sickle cell disease (SCD) and asthma share a complex relationship. Although estimates vary, asthma prevalence in children with SCD is believed to be comparable to or higher than the general population. Determining whether SCD confers an increased risk for asthma remains challenging due to overlapping symptoms and the ...
Suhei C. Zuleta De Bernardis   +9 more
wiley   +1 more source

Ciphertext Obfuscation-based Oblivious Transfer Protocol [PDF]

open access: yesJisuanji gongcheng
The Oblivious Transfer (OT) protocol is a privacy-preserving two-way communication protocol important for building secure multiparty computations. To exchange symmetric keys, this protocol is typically based on the Rivest—Shamir—Adleman (RSA) or Diffie ...
LI Xiaodong, ZHU Xiaopeng, ZHANG Jianyi, WU Yong, DOU Yimeng
doaj   +1 more source

Investigating Profiled Side-Channel Attacks Against the DES Key Schedule

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
Recent publications describe profiled single trace side-channel attacks (SCAs) against the DES key-schedule of a “commercially available security controller”.
Johann Heyszl   +9 more
doaj   +1 more source

Using LDGM Codes and Sparse Syndromes to Achieve Digital Signatures

open access: yes, 2013
In this paper, we address the problem of achieving efficient code-based digital signatures with small public keys. The solution we propose exploits sparse syndromes and randomly designed low-density generator matrix codes.
A. Becker   +15 more
core   +1 more source

Psychosocial Outcomes in Patients With Endocrine Tumor Syndromes: A Systematic Review

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction The combination of disease manifestations, the familial burden, and varying penetrance of endocrine tumor syndromes (ETSs) is unique. This review aimed to portray and summarize available data on psychosocial outcomes in patients with ETSs and explore gaps and opportunities for future research and care.
Daniël Zwerus   +6 more
wiley   +1 more source

Integrating musicological knowledge into a probabilistic framework for chord and key extraction [PDF]

open access: yes, 2010
In this contribution a formerly developed probabilistic framework for the simultaneous detection of chords and keys in polyphonic audio is further extended and validated.
Martens, Jean-Pierre, Pauwels, Johan
core  

A resilient key predistribution scheme for multiphase wireless sensor networks [PDF]

open access: yes, 2009
In wireless sensor networks, sensor nodes eventually die due to battery depletion. Wireless sensor networks (WSNs) in which new nodes are periodically redeployed with certain intervals, called generations, to replace the dead nodes are called multi-phase
Ergun, Murat   +3 more
core   +2 more sources

Nutritional and Behavioral Intervention for Long‐Term Childhood Acute Leukemia Survivors With Metabolic Syndrome

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Metabolic syndrome (MetS) is a common complication in survivors of childhood acute lymphoblastic and myeloid leukemia (AL), and a major risk factor for premature cardiovascular disease, type‐2‐diabetes, and metabolic dysfunction‐associated steatotic liver disease (MASLD).
Visentin Sandrine   +10 more
wiley   +1 more source

Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices [PDF]

open access: yes, 2011
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations
Herrera Joancomartí, Jordi   +1 more
core   +4 more sources

Home - About - Disclaimer - Privacy