Results 71 to 80 of about 2,281 (257)
Matrix Multiplication is a basic engineering and scientific problem, which has application in various domains. There exists many cryptographic solutions for secure computation of matrix multiplication, but cryptographic preamble makes them infeasible for
Malay Kumar, Jasraj Meena, Manu Vardhan
doaj +1 more source
A Verifiable Sealed-Bid Multi-Qualitative-Attribute Based Auction Scheme in the Semi-Honest Model
Recently, several privacy-preserving auction schemes are proposed for protecting the bid privacy and securing the auction. In this paper, a sealed-bid auction scheme focusing on multi-attribute is presented.
Wenbo Shi +5 more
doaj +1 more source
Verifying computations without reexecuting them [PDF]
From theoretical possibility to near practicality.
Michael Walfish, Andrew J. Blumberg
openaire +1 more source
ABSTRACT Background Parents of children treated for acute lymphoblastic leukemia (ALL) often experience significant caregiver burden and disruption to their well‐being. While parent quality of life (QoL) during treatment is well characterized, little is known about outcomes during early survivorship.
Sara Dal Pra +3 more
wiley +1 more source
Shorter lattice-based verifiable encryption using bimodal Gaussian
Verifiable encryption enables the decryption to be taken on properly generated ciphertexts, by making the encryptor provide a zero-knowledge proof. To meet the quantum-safe application requirements, such as key escrow, Lyubashevsky et al.
Dong Fang +5 more
doaj +1 more source
ABSTRACT A second allogeneic (allo‐)hematopoietic stem cell transplantation (HSCT2) is a potential curative option for pediatric patients with acute lymphoblastic leukemia (ALL) following relapse after first allogeneic transplantation (HSCT1), but its efficacy is limited by high relapse rates and transplant‐related toxicity in highly pretreated ...
Ava Momm +10 more
wiley +1 more source
Fast, Verified Computation for HOL ITPs
Abstract We add an efficient function for computation to the kernels of higher-order logic interactive theorem provers. First, we develop and prove sound our approach for Candle. Candle is a port of HOL Light which has been proved sound with respect to the inference rules of its higher-order logic; we extend its implementation and soundness ...
Abrahamsson, Oskar +4 more
openaire +1 more source
Abstract Background A routine baseline echocardiogram is often obtained prior to anthracycline administration in children with cancer. The utility of baseline echocardiogram is unclear in patients with standard risk B‐cell acute lymphoblastic leukemia (SR B‐ALL) as their anthracycline cumulative dose is low.
Ziyad Alrajhi +4 more
wiley +1 more source
ABSTRACT Introduction Patients with ovarian cancer often present with massive ascites, leading to significant protein loss during surgical procedures. Although cell‐free concentrated ascites reinfusion therapy (CART) is used in palliative settings to mitigate protein loss, its application in intraoperative settings remains unexplored.
Yutaka Yoneoka +7 more
wiley +1 more source
ABSTRACT Secondary hyperparathyroidism (SHPT) is a common complication in patients receiving maintenance dialysis, driven by calcium and phosphate metabolism disturbances. Calcimimetics are central to the management of SHPT by enhancing calcium‐sensing receptor sensitivity and reducing parathyroid hormone secretion.
Fumihiko Koiwa +3 more
wiley +1 more source

