Results 81 to 90 of about 528,126 (280)
Review and Analysis of Cryptographic Schemes Implementing Threshold Signature
This work is devoted to the study of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, ellipt ic curves and bilinear pairings were ...
Anastasiya Victorovna Beresneva +1 more
doaj
Positron line radiation from halo WIMP annihilations as a dark matter signature [PDF]
We suggest a new signature for dark matter annihilation in the halo: high energy positron line radiation. Because the cosmic ray positron spectrum falls rapidly with energy, e+'s from halo WIMP annihilations can be a significant, clean signal for very ...
Turner, Michael S., Wilczek, Frank
core +1 more source
Bootstrapping QCD: the Lake, the Peninsula and the Kink
We consider the S-matrix bootstrap of four dimensional scattering amplitudes with $O(3)$ symmetry and no bound-states. We explore the allowed space of scattering lengths which parametrize the interaction strength at threshold of the various scattering ...
Guerrieri, Andrea L. +2 more
core +1 more source
Intratumour heterogeneity complicates precision management of advanced endometrial cancer. Circulating tumor DNA (ctDNA) offers a minimally invasive strategy to capture tumor evolution and therapeutic resistance. Here, we compare tumor‐agnostic NGS with tumor‐informed ddPCR, outlining their relative sensitivity, concordance, and clinical implications ...
Carlos Casas‐Arozamena +15 more
wiley +1 more source
ID-based efficient and proactive threshold proxy signature in the standard model
The security of existing identity-based threshold proxy signature schemes were almost proven in the random oracle model,and each proxy signer’s proxy signature key was fixed in the valid period.A(t,n) ID-based proactive threshold proxy signature scheme ...
YU Yi-ke1, ZHENG Xue-feng2
doaj +2 more sources
Dormant cancer cells can hide in distant organs for years, evading treatment and the immune system. This review highlights how signals from the surrounding tissue and immune environment keep these cells inactive or trigger their reawakening. Understanding these mechanisms may help develop therapies to eliminate or control dormant cells and prevent ...
Kanishka Tiwary +1 more
wiley +1 more source
Identity-based threshold signature (IDTHS) allows a threshold number of signers to generate signatures to improve the deterministic wallet in the blockchain.
Jing Tian +5 more
doaj +1 more source
Obfuscating encrypted threshold signature algorithm and its applications in cloud computing. [PDF]
Li Y +6 more
europepmc +1 more source
In November 2010, the search for the 4He-{\eta} bound state was per formed with high statistics and high acceptance with the WASA-at-COSY facility using a ramped beam technique.
Krzemien, W., Moskal, P., Skurzok, M.
core +1 more source
A urine‐based digital PCR assay targeting two hotspot TERT promoter variants detected bladder cancer with high sensitivity and no false positives in this case–control cohort. The streamlined AbsoluteQ workflow outperformed Sanger sequencing and supports non‐invasive molecular testing for bladder cancer detection.
Anna Nykel +12 more
wiley +1 more source

