Results 251 to 260 of about 2,069,680 (303)
The Role of Caregivers in Supporting Personal Recovery in Youth with Mental Health Concerns. [PDF]
McKern DB +4 more
europepmc +1 more source
The Hostile Hospital: Exploring Hospitality, Violence, and the Doctor-Patient Relationship. [PDF]
Milford SR, Lorenzini G.
europepmc +1 more source
Handing Money to the Poor Is Never Enough: The Impact of Marginalization-Related Diminished Returns. [PDF]
Assari S, Zare H.
europepmc +1 more source
A lightweight zero-trust authentication architecture for IoT via unified enhanced FAST-SM9 and dynamic re-authentication. [PDF]
Ma Z +5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Unconditional Security of Cryptosystems
, 2015The security of many currently used cryptosystems, in particular that of all public-key cryptosystems, is based on the hardness of an underlying computational problem, such as factoring integers or computing discrete logarithms. Security proofs for these systems show that the ability of an adversary to perform a successful attack contradicts the ...
H. Delfs, H. Knebl
semanticscholar +2 more sources
Unconditional Security Wireless Communication
, 2013Wyner, Csiszar and Korner developed the concept of the wiretap channel for wired links. In a wiretap channel, the eavesdropper is assumed to receive messages transmitted by the sender over a channel that is noisier than the legitimate receiver’s channel.
H. Wen
semanticscholar +2 more sources
Unconditional Security in Cryptography
Lectures on Data Security, 1998The fact that most presently- used cryptosystems cannot be rigorously proven secure and hence permanently face the risk of being broken motivates the search for schemes with unconditional security. The corresponding proofs however must be based on information theory rather than complexity theory. One reason for this is the lack of known lower bounds on
S. Wolf
semanticscholar +2 more sources
Unconditional security through quantum uncertainty
International Journal of Critical Infrastructure Protection, 2017P. Verma
semanticscholar +2 more sources
IACR Cryptology ePrint Archive, 2022
We revisit Gradecast (Feldman and Micali, STOC'88) in Synchrony and Reliable Broadcast (Bracha, Information and Computation'87) in Asynchrony. For both tasks ,we provide new protocols that have three desirable properties: (1) optimal resilience ...
Ittai Abraham, Gilad Asharov
semanticscholar +1 more source
We revisit Gradecast (Feldman and Micali, STOC'88) in Synchrony and Reliable Broadcast (Bracha, Information and Computation'87) in Asynchrony. For both tasks ,we provide new protocols that have three desirable properties: (1) optimal resilience ...
Ittai Abraham, Gilad Asharov
semanticscholar +1 more source
On Unconditional ϵ-Security of Private Key Encryption
The Computer Journal, 2014Shaoquan Jiang
semanticscholar +2 more sources

