Results 11 to 20 of about 342,314 (174)
A distributed cross-chain mechanism based on notary schemes and group signatures
Blockchain technology has attracted significant attention since its publication. However, most existing blockchain platforms are isolated systems, which makes it difficult to exchange data among different blockchains. The industry has proposed the notary
Xiaohua Wu +4 more
doaj +1 more source
Secure Threshold Ring Signature Based on SM9
Nowadays, it becomes a major issue that has become increasingly prominent to ensure the privacy and security of information. With the wide application of SM9 algorithm in various fields, it is particularly important to improve the security of SM9 ...
Shuanggen Liu +3 more
doaj +1 more source
Objectives: To develop a mutation-based radiomics signature to predict response to imatinib in Gastrointestinal Stromal Tumors (GISTs). Methods: Eighty-two patients with GIST were enrolled in this retrospective study, including 52 patients from one ...
Giovanni Cappello +17 more
doaj +1 more source
Secure Obfuscation for Encrypted Group Signatures. [PDF]
In recent years, group signature techniques are widely used in constructing privacy-preserving security schemes for various information systems. However, conventional techniques keep the schemes secure only in normal black-box attack contexts.
Yang Shi +3 more
doaj +1 more source
Immune dysregulation has been reported in schizophrenia spectrum disorders (SSD). In the past decade, several trials using anti-inflammatory agents for treatment of SSD have been completed, with so far limited success.
Mareike Aichholzer +8 more
doaj +1 more source
An Algorithm of (n, t)-Threshold Proxy Signature with an Arbitrator
The paper presents an (n, t)-threshold proxy signature scheme with an Arbitrator which enables an original signer to delegate the signature authority to sign a message on behalf of the original signer to proxy group P of n members.
E. A. Tolyupa
doaj +3 more sources
PurposeThis study aims to explore the value of the delta-radiomics (DelRADx) model in predicting the invasiveness of lung adenocarcinoma manifesting as radiological part-solid nodules (PSNs).MethodsA total of 299 PSNs histopathologically confirmed as ...
Wufei Chen +8 more
doaj +1 more source
Study on Time Rotation Notary Group Model Based on Threshold Signature [PDF]
With the emergence of various blockchain systems,the demand for cross-chain interaction is increasing,and the security of cross-chain bridge verification becomes more and more important.The notary schemes have simple principle and high efficiency,and are
ZANG Wenyang, LYU Jinlai
doaj +1 more source
Lung adenocarcinoma (LUAD) is the main pathological subtype of non-small-cell lung cancer. Endoplasmic reticulum stress (ERS) has been found to be involved in multiple tumor-related biological processes.
CaiZhen Yang +6 more
doaj +1 more source
As the Internet of Things (IoT) paradigm gets more attention from academia and industry, implementation tools of IoT will be explored more and more. One example is the applicability of blockchain systems to provide security and privacy of IoT networks ...
Ismail Butun, Patrik Osterberg
doaj +1 more source

