Results 11 to 20 of about 342,314 (174)

A distributed cross-chain mechanism based on notary schemes and group signatures

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
Blockchain technology has attracted significant attention since its publication. However, most existing blockchain platforms are isolated systems, which makes it difficult to exchange data among different blockchains. The industry has proposed the notary
Xiaohua Wu   +4 more
doaj   +1 more source

Secure Threshold Ring Signature Based on SM9

open access: yesIEEE Access, 2021
Nowadays, it becomes a major issue that has become increasingly prominent to ensure the privacy and security of information. With the wide application of SM9 algorithm in various fields, it is particularly important to improve the security of SM9 ...
Shuanggen Liu   +3 more
doaj   +1 more source

A mutation-based radiomics signature predicts response to imatinib in Gastrointestinal Stromal Tumors (GIST)

open access: yesEuropean Journal of Radiology Open, 2023
Objectives: To develop a mutation-based radiomics signature to predict response to imatinib in Gastrointestinal Stromal Tumors (GISTs). Methods: Eighty-two patients with GIST were enrolled in this retrospective study, including 52 patients from one ...
Giovanni Cappello   +17 more
doaj   +1 more source

Secure Obfuscation for Encrypted Group Signatures. [PDF]

open access: yesPLoS ONE, 2015
In recent years, group signature techniques are widely used in constructing privacy-preserving security schemes for various information systems. However, conventional techniques keep the schemes secure only in normal black-box attack contexts.
Yang Shi   +3 more
doaj   +1 more source

Inflammatory monocyte gene signature predicts beneficial within group effect of simvastatin in patients with schizophrenia spectrum disorders in a secondary analysis of a randomized controlled trial

open access: yesBrain, Behavior, & Immunity - Health, 2022
Immune dysregulation has been reported in schizophrenia spectrum disorders (SSD). In the past decade, several trials using anti-inflammatory agents for treatment of SSD have been completed, with so far limited success.
Mareike Aichholzer   +8 more
doaj   +1 more source

An Algorithm of (n, t)-Threshold Proxy Signature with an Arbitrator

open access: yesМоделирование и анализ информационных систем, 2013
The paper presents an (n, t)-threshold proxy signature scheme with an Arbitrator which enables an original signer to delegate the signature authority to sign a message on behalf of the original signer to proxy group P of n members.
E. A. Tolyupa
doaj   +3 more sources

A delta-radiomics model for preoperative prediction of invasive lung adenocarcinomas manifesting as radiological part-solid nodules

open access: yesFrontiers in Oncology, 2022
PurposeThis study aims to explore the value of the delta-radiomics (DelRADx) model in predicting the invasiveness of lung adenocarcinoma manifesting as radiological part-solid nodules (PSNs).MethodsA total of 299 PSNs histopathologically confirmed as ...
Wufei Chen   +8 more
doaj   +1 more source

Study on Time Rotation Notary Group Model Based on Threshold Signature [PDF]

open access: yesJisuanji kexue
With the emergence of various blockchain systems,the demand for cross-chain interaction is increasing,and the security of cross-chain bridge verification becomes more and more important.The notary schemes have simple principle and high efficiency,and are
ZANG Wenyang, LYU Jinlai
doaj   +1 more source

Prognostic Risk Signature and Comprehensive Analyses of Endoplasmic Reticulum Stress-Related Genes in Lung Adenocarcinoma

open access: yesJournal of Immunology Research, 2022
Lung adenocarcinoma (LUAD) is the main pathological subtype of non-small-cell lung cancer. Endoplasmic reticulum stress (ERS) has been found to be involved in multiple tumor-related biological processes.
CaiZhen Yang   +6 more
doaj   +1 more source

A Review of Distributed Access Control for Blockchain Systems Towards Securing the Internet of Things

open access: yesIEEE Access, 2021
As the Internet of Things (IoT) paradigm gets more attention from academia and industry, implementation tools of IoT will be explored more and more. One example is the applicability of blockchain systems to provide security and privacy of IoT networks ...
Ismail Butun, Patrik Osterberg
doaj   +1 more source

Home - About - Disclaimer - Privacy