Results 61 to 70 of about 18,387 (191)

A Novel α‐Synuclein K58N Missense Variant in a Patient with Parkinson's Disease

open access: yesMovement Disorders, Volume 40, Issue 12, Page 2732-2745, December 2025.
Abstract Background Parkinson's disease (PD) is a complex multifactorial disorder with a genetic component in about 15% of cases. Multiplications and point mutations in SNCA gene, encoding α‐synuclein (aSyn), are linked to rare familial forms of PD. Objective Our goal was to assess the clinical presentation and the biological effects of a novel K58N ...
Mohammed Al‐Azzani   +24 more
wiley   +1 more source

Access and Privacy Control for Healthcare Decision Support System: A Smart Medical Data Exchange Engine (SMDEE)

open access: yesCAAI Transactions on Intelligence Technology, Volume 10, Issue 6, Page 1616-1632, December 2025.
ABSTRACT Secure and automated sharing of medical information among different medical entities/stakeholders like patients, hospitals, doctors, law enforcement agencies, health insurance companies etc., in a standard format has always been a challenging problem. Current methods for ensuring compliance with medical privacy laws require specialists who are
Imran Khan   +5 more
wiley   +1 more source

Towards a Flexible Intra-Trustcenter Management Protocol

open access: yes, 2004
This paper proposes the Intra Trustcenter Protocol (ITP), a flexible and secure management protocol for communication between arbitrary trustcenter components.
Alexander Wiesmaier   +6 more
core   +1 more source

Report on the XBase Project [PDF]

open access: yes, 2010
This project addressed the conceptual fundamentals of data storage, investigating techniques for provision of highly generic storage facilities that can be tailored to produce various individually customised storage infrastructures, compliant to the ...
Dearle, Alan   +3 more
core   +1 more source

Stacco: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves

open access: yes, 2017
Intel Software Guard Extension (SGX) offers software applications enclave to protect their confidentiality and integrity from malicious operating systems.
Almeida José Bacelar   +18 more
core   +1 more source

Image database system for glaucoma diagnosis support [PDF]

open access: yes, 2008
Tato práce popisuje přehled standardních a pokročilých metod používaných k diagnose glaukomu v ranném stádiu. Na základě teoretických poznatků je implementován internetově orientovaný informační systém pro oční lékaře, který má tři hlavní cíle.
Peter, Roman
core  

Non-Symbolic Fragmentation [PDF]

open access: yes, 2002
This paper reports on the use of non-symbolic fragmentation of data for securing communications. Non-symbolic fragmentation, or NSF, relies on breaking up data into non-symbolic fragments, which are (usually irregularly-sized) chunks whose boundaries do ...
Ashman, Helen   +4 more
core  

Privacy-Preserving Trust Management Mechanisms from Private Matching Schemes

open access: yes, 2013
Cryptographic primitives are essential for constructing privacy-preserving communication mechanisms. There are situations in which two parties that do not know each other need to exchange sensitive information on the Internet. Trust management mechanisms
A Miyaji   +14 more
core   +1 more source

Secure Data Collection Method Based on Quantum Encryption Algorithm for Power IoT Gateway

open access: yes天地一体化信息网络
In order to realize the secure and high-efficiency collection of electric power IoT gateway data, the secure collection method of electric power IoT gateway data based on quantum encryption algorithm is proposed. By analyzing the architecture of electric
ZHANG Jingxin, CHEN Chao, ZHANG Ping
doaj  

Conceptual evidence collection and analysis methodology for Android devices

open access: yes, 2015
Android devices continue to grow in popularity and capability meaning the need for a forensically sound evidence collection methodology for these devices also increases. This chapter proposes a methodology for evidence collection and analysis for Android
Al Mutawa   +23 more
core   +1 more source

Home - About - Disclaimer - Privacy