Results 61 to 70 of about 18,387 (191)
A Novel α‐Synuclein K58N Missense Variant in a Patient with Parkinson's Disease
Abstract Background Parkinson's disease (PD) is a complex multifactorial disorder with a genetic component in about 15% of cases. Multiplications and point mutations in SNCA gene, encoding α‐synuclein (aSyn), are linked to rare familial forms of PD. Objective Our goal was to assess the clinical presentation and the biological effects of a novel K58N ...
Mohammed Al‐Azzani +24 more
wiley +1 more source
ABSTRACT Secure and automated sharing of medical information among different medical entities/stakeholders like patients, hospitals, doctors, law enforcement agencies, health insurance companies etc., in a standard format has always been a challenging problem. Current methods for ensuring compliance with medical privacy laws require specialists who are
Imran Khan +5 more
wiley +1 more source
Towards a Flexible Intra-Trustcenter Management Protocol
This paper proposes the Intra Trustcenter Protocol (ITP), a flexible and secure management protocol for communication between arbitrary trustcenter components.
Alexander Wiesmaier +6 more
core +1 more source
Report on the XBase Project [PDF]
This project addressed the conceptual fundamentals of data storage, investigating techniques for provision of highly generic storage facilities that can be tailored to produce various individually customised storage infrastructures, compliant to the ...
Dearle, Alan +3 more
core +1 more source
Intel Software Guard Extension (SGX) offers software applications enclave to protect their confidentiality and integrity from malicious operating systems.
Almeida José Bacelar +18 more
core +1 more source
Image database system for glaucoma diagnosis support [PDF]
Tato práce popisuje přehled standardních a pokročilých metod používaných k diagnose glaukomu v ranném stádiu. Na základě teoretických poznatků je implementován internetově orientovaný informační systém pro oční lékaře, který má tři hlavní cíle.
Peter, Roman
core
Non-Symbolic Fragmentation [PDF]
This paper reports on the use of non-symbolic fragmentation of data for securing communications. Non-symbolic fragmentation, or NSF, relies on breaking up data into non-symbolic fragments, which are (usually irregularly-sized) chunks whose boundaries do ...
Ashman, Helen +4 more
core
Privacy-Preserving Trust Management Mechanisms from Private Matching Schemes
Cryptographic primitives are essential for constructing privacy-preserving communication mechanisms. There are situations in which two parties that do not know each other need to exchange sensitive information on the Internet. Trust management mechanisms
A Miyaji +14 more
core +1 more source
Secure Data Collection Method Based on Quantum Encryption Algorithm for Power IoT Gateway
In order to realize the secure and high-efficiency collection of electric power IoT gateway data, the secure collection method of electric power IoT gateway data based on quantum encryption algorithm is proposed. By analyzing the architecture of electric
ZHANG Jingxin, CHEN Chao, ZHANG Ping
doaj
Conceptual evidence collection and analysis methodology for Android devices
Android devices continue to grow in popularity and capability meaning the need for a forensically sound evidence collection methodology for these devices also increases. This chapter proposes a methodology for evidence collection and analysis for Android
Al Mutawa +23 more
core +1 more source

