Results 61 to 70 of about 18,923 (241)
Efficient Verifiable Dynamic Threshold Secret Sharing Scheme Based on Elliptic Curves
A dynamic threshold secret sharing (DTSS) scheme allows the secret to be updated without changing the shares. The first DTSS scheme was proposed by Laih et al. in 1991. Several other schemes based on different methods have been proposed since then.
Amir Alaei, Mohammad Hesam Tadayon
doaj
Abstract Background A routine baseline echocardiogram is often obtained prior to anthracycline administration in children with cancer. The utility of baseline echocardiogram is unclear in patients with standard risk B‐cell acute lymphoblastic leukemia (SR B‐ALL) as their anthracycline cumulative dose is low.
Ziyad Alrajhi +4 more
wiley +1 more source
Secure Collaborative Publicly Verifiable Computation
Publicly Verifiable Computation (PVC) enables computationally weak trusted sources to outsource several computations to some more powerful public untrusted clouds.
Qiang Wang +4 more
doaj +1 more source
ABSTRACT Introduction Patients with ovarian cancer often present with massive ascites, leading to significant protein loss during surgical procedures. Although cell‐free concentrated ascites reinfusion therapy (CART) is used in palliative settings to mitigate protein loss, its application in intraoperative settings remains unexplored.
Yutaka Yoneoka +7 more
wiley +1 more source
Secure Dynamic Big Graph Data: Scalable, Low-Cost Remote Data Integrity Checking
As a special type of big data, the big graph has wide applications. The remote data integrity checking (RDIC) scheme enables public clouds to efficiently convince the clients that their graph data are stored properly, without the need of retrieving the ...
Yu Lu, Fei Hu
doaj +1 more source
Joe and his cartoon-character friends began populating advertisements for the Camel brand in the United States in 1988 and continued doing so for the next decade (figure 1). As described in a fawning retrospective produced for RJ Reynolds: “Between 1988 and 1997, the Joe Camel campaign was one of the most recognized ad campaigns in America, and that ...
openaire +2 more sources
ABSTRACT Secondary hyperparathyroidism (SHPT) is a common complication in patients receiving maintenance dialysis, driven by calcium and phosphate metabolism disturbances. Calcimimetics are central to the management of SHPT by enhancing calcium‐sensing receptor sensitivity and reducing parathyroid hormone secretion.
Fumihiko Koiwa +3 more
wiley +1 more source
Shorter lattice-based verifiable encryption using bimodal Gaussian
Verifiable encryption enables the decryption to be taken on properly generated ciphertexts, by making the encryptor provide a zero-knowledge proof. To meet the quantum-safe application requirements, such as key escrow, Lyubashevsky et al.
Dong Fang +5 more
doaj +1 more source
Revealing the structure of land plant photosystem II: the journey from negative‐stain EM to cryo‐EM
Advances in cryo‐EM have revealed the detailed structure of Photosystem II, a key protein complex driving photosynthesis. This review traces the journey from early low‐resolution images to high‐resolution models, highlighting how these discoveries deepen our understanding of light harvesting and energy conversion in plants.
Roman Kouřil
wiley +1 more source
Mapping the evolution of mitochondrial complex I through structural variation
Respiratory complex I (CI) is crucial for bioenergetic metabolism in many prokaryotes and eukaryotes. It is composed of a conserved set of core subunits and additional accessory subunits that vary depending on the organism. Here, we categorize CI subunits from available structures to map the evolution of CI across eukaryotes. Respiratory complex I (CI)
Dong‐Woo Shin +2 more
wiley +1 more source

