Results 41 to 50 of about 11,143,812 (289)

Efficient Arbitrarily Divisible E-Cash Applicable to Secure Massive Transactions

open access: yesIEEE Access, 2019
A conventional divisible E-cash (DEC) system allows each user to withdraw a coin of value 2n, then spend it in several times by dividing it into small ones of value 2l, for some l ∈ {0, 1, ⋯, n}. Observing that the price of many commodities
Jianhua Liu
doaj   +1 more source

Cryptanalysis and Improvement of a Proxy Signcryption Scheme in the Standard Computational Model

open access: yesIEEE Access, 2020
Proxy signcryption is essential security primitive for emerging secure communication such as e-business, mobile agents, online voting, contract signing, and online auction.
Abdul Waheed   +7 more
doaj   +1 more source

Beyond the Cosmological Standard Model [PDF]

open access: yes, 2014
After a decade and a half of research motivated by the accelerating universe, theory and experiment have a reached a certain level of maturity. The development of theoretical models beyond \Lambda, or smooth dark energy, often called modified gravity ...
Jain, Bhuvnesh   +3 more
core   +1 more source

Why and When Are Evidence‐Based Interventions Adopted in Paediatric Supportive Care? A Qualitative Exploration of the Determinants of Photobiomodulation Implementation

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Oral mucositis is a common and debilitating side effect of childhood cancer and stem cell transplant treatments. It affects the quality of life of children and young people (CYP) and places a strain on services. Photobiomodulation is recommended for oral mucositis prevention in international guidance but is poorly implemented in UK ...
Claudia Heggie   +4 more
wiley   +1 more source

Development of methods and instruments of systemically important credit organizations regulation: world experience, Russian practice

open access: yesУченые записки Российской академии предпринимательства, 2021
In the article are offered the structure of SIFI regulation system, its principles, and described the standard model in accordance with which is necessary to develop the regulation system of systemically important credit organizations in Russia.
M. A. Zhurba
doaj  

Secure and Efficient Multi-Authority Attribute-Based Encryption Scheme From Lattices

open access: yesIEEE Access, 2019
Attribute-based encryption (ABE) mechanism on lattices can against quantum attack and guarantees fine-grained access control of encrypted data, and it has been widely used in cloud computing and privacy protection.
Yuan Liu   +3 more
doaj   +1 more source

Real‐World Pediatric Blinatumomab Administration: Access to Outpatient Care Delivery and Impact of a Hospital‐Dispensed Model

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Blinatumomab has been shown to be highly effective for patients with pediatric B‐ALL and has recently become standard of care therapy. Due to its past use in the clinical trial setting, there is limited information available about real‐world administration.
Katelyn Oranges   +12 more
wiley   +1 more source

Beyond the Standard Model [PDF]

open access: yesInference: International Review of Science, 1989
Spontaneous symmetry breaking has led physicists to possible solutions that extend the Standard Model theory to include gravity and dark matter candidates.
openaire   +4 more sources

SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search

open access: yesIEEE Access, 2019
Searchable encryption is a novel cryptographic primitive that enables a data storage server to retrieve the data ciphertexts without the knowledge of either what is searched for or the contents of the searched data ciphertexts.
Yang Lu, Jiguo Li, Yichen Zhang
doaj   +1 more source

A Note on Intended and Standard Models

open access: yesStudia Humana, 2020
This note discusses some problems concerning intended, standard, and nonstandard models of mathematical theories. We pay attention to the role of extremal axioms in attempts at a unique characterization of the intended models. We recall also Jan Woleński’
Pogonowski Jerzy
doaj   +1 more source

Home - About - Disclaimer - Privacy