Results 71 to 80 of about 192,432 (282)

On alternative approach for verifiable secret sharing [PDF]

open access: yes, 2002
Secret sharing allows split/distributed control over the secret (e.g. master key). Verifiable secret sharing (VSS) is the secret sharing extended by verification capacity. Usually verification comes at the price.
Kotulski, Zbigniew   +2 more
core   +2 more sources

Outcomes of Live Virus Vaccination in Patients With Vascular Anomalies Being Treated With Sirolimus

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Live vaccination in patients with vascular anomalies (VA) receiving sirolimus remains controversial due to immunosuppressive effects and theoretical risks. Procedure This single‐center retrospective study included patients with VA less than 4 years old at the start of sirolimus therapy who were incompletely vaccinated.
Svatava Merkle   +5 more
wiley   +1 more source

Verifiable multi-secret sharing schemes applicable to arbitrary access structures

open access: yesTongxin xuebao, 2007
Verifiable multi-secret sharing on general access structures was studied.A method of construct verifiable se-cret sharing schemes with arbitrary access structure was given.The verifiable multi-secret sharing schemes constructed by this method have the ...
ZHANG Fu-tai1, WANG Yu-min2
doaj   +2 more sources

NRASQ61R Expression in Lymphatic Endothelial Cells Causes Enlarged Vessels, Hemorrhagic Chylous Effusions, and High Mortality in a Mouse Model of Kaposiform Lymphangiomatosis

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Kaposiform lymphangiomatosis (KLA) is an aggressive complex lymphatic anomaly. Patients exhibit malformed lymphatic vessels and often develop hemorrhagic effusions and elevated angiopoietin‐2 (Ang‐2) levels. A somatic NRAS p.Q61R (NRASQ61R) mutation has been associated with KLA.
C. Griffin McDaniel   +3 more
wiley   +1 more source

Correctness Verifiable Outsourcing Computation Scheme of Shortest Path Querying over Encrypted Graph Data [PDF]

open access: yesJisuanji kexue
Mass graph data such as geolocation and social networks are widely used and contain massive privacy,usually,it requires varied query services through secure outsourcing computation schemes.However,it is still an open challenge to design correctness ...
DING Hongfa, YU Yingying, JIANG Heling
doaj   +1 more source

Secure and Verifiable Electronic Voting in Practice: the use of vVote in the Victorian State Election

open access: yes, 2015
The November 2014 Australian State of Victoria election was the first statutory political election worldwide at State level which deployed an end-to-end verifiable electronic voting system in polling places. This was the first time blind voters have been
Burton, Craig   +2 more
core  

Pulmonary Dysfunction Is Associated With Sleep Study Abnormalities in Children With Sickle Cell Disease: A Multicenter Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction Pulmonary dysfunction and sleep abnormalities are common in children with sickle cell disease (SCD) and are associated with worse clinical outcomes. Whether spirometry abnormalities are associated with polysomnography (PSG) findings remains unclear.
Ammar Saadoon Alishlash   +4 more
wiley   +1 more source

The Fate (Outcome) of Clinically Apparent Single Lesion and Oligofocal Nephroblastomatosis Treated According to SIOP/GPOH Protocols for Wilms Tumor

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background The management of clinically apparent single lesions or oligofocal nephroblastomatosis, a facultative precursor of nephroblastoma, remains debated. Methods We retrospectively analyzed 37 patients with clinically apparent single or oligofocal nephroblastomatosis (two to three lesions per kidney) among 2347 patients registered between
Nils Welter   +17 more
wiley   +1 more source

Efficient Verifiable Dynamic Threshold Secret Sharing Scheme Based on Elliptic Curves

open access: yesInternational Journal of Information and Communication Technology Research, 2015
A dynamic threshold secret sharing (DTSS) scheme allows the secret to be updated without changing the shares. The first DTSS scheme was proposed by Laih et al. in 1991. Several other schemes based on different methods have been proposed since then.
Amir Alaei, Mohammad Hesam Tadayon
doaj  

A High‐Sensitivity Circulating Nucleic Acid Sequencing Assay for Assessing Treatment Response to Alectinib in a Pediatric Patient With ALK‐Rearranged Non–Small Cell Lung Cancer

open access: yes
Pediatric Blood &Cancer, EarlyView.
Alberto D. Guerra   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy