Results 71 to 80 of about 192,432 (282)
On alternative approach for verifiable secret sharing [PDF]
Secret sharing allows split/distributed control over the secret (e.g. master key). Verifiable secret sharing (VSS) is the secret sharing extended by verification capacity. Usually verification comes at the price.
Kotulski, Zbigniew +2 more
core +2 more sources
Outcomes of Live Virus Vaccination in Patients With Vascular Anomalies Being Treated With Sirolimus
ABSTRACT Background Live vaccination in patients with vascular anomalies (VA) receiving sirolimus remains controversial due to immunosuppressive effects and theoretical risks. Procedure This single‐center retrospective study included patients with VA less than 4 years old at the start of sirolimus therapy who were incompletely vaccinated.
Svatava Merkle +5 more
wiley +1 more source
Verifiable multi-secret sharing schemes applicable to arbitrary access structures
Verifiable multi-secret sharing on general access structures was studied.A method of construct verifiable se-cret sharing schemes with arbitrary access structure was given.The verifiable multi-secret sharing schemes constructed by this method have the ...
ZHANG Fu-tai1, WANG Yu-min2
doaj +2 more sources
ABSTRACT Background Kaposiform lymphangiomatosis (KLA) is an aggressive complex lymphatic anomaly. Patients exhibit malformed lymphatic vessels and often develop hemorrhagic effusions and elevated angiopoietin‐2 (Ang‐2) levels. A somatic NRAS p.Q61R (NRASQ61R) mutation has been associated with KLA.
C. Griffin McDaniel +3 more
wiley +1 more source
Correctness Verifiable Outsourcing Computation Scheme of Shortest Path Querying over Encrypted Graph Data [PDF]
Mass graph data such as geolocation and social networks are widely used and contain massive privacy,usually,it requires varied query services through secure outsourcing computation schemes.However,it is still an open challenge to design correctness ...
DING Hongfa, YU Yingying, JIANG Heling
doaj +1 more source
The November 2014 Australian State of Victoria election was the first statutory political election worldwide at State level which deployed an end-to-end verifiable electronic voting system in polling places. This was the first time blind voters have been
Burton, Craig +2 more
core
ABSTRACT Introduction Pulmonary dysfunction and sleep abnormalities are common in children with sickle cell disease (SCD) and are associated with worse clinical outcomes. Whether spirometry abnormalities are associated with polysomnography (PSG) findings remains unclear.
Ammar Saadoon Alishlash +4 more
wiley +1 more source
ABSTRACT Background The management of clinically apparent single lesions or oligofocal nephroblastomatosis, a facultative precursor of nephroblastoma, remains debated. Methods We retrospectively analyzed 37 patients with clinically apparent single or oligofocal nephroblastomatosis (two to three lesions per kidney) among 2347 patients registered between
Nils Welter +17 more
wiley +1 more source
Efficient Verifiable Dynamic Threshold Secret Sharing Scheme Based on Elliptic Curves
A dynamic threshold secret sharing (DTSS) scheme allows the secret to be updated without changing the shares. The first DTSS scheme was proposed by Laih et al. in 1991. Several other schemes based on different methods have been proposed since then.
Amir Alaei, Mohammad Hesam Tadayon
doaj

