-
1
New secure distributed secret sharing scheme of n product
Published 2014-11-01“…Since Shamir’s secret sharing scheme does not have the property of the multiplicative homomorphism,an encoding method is utilized for privacy-preserving data to overcome the drawbacks in secure distributed multiplication calculation when using traditional Shamir’s polynomial to share the product of n secrets.Using this encoding method with multiplicative homomorphism and a commitment scheme supporting additive homomorphism,a new secure distributed secret sharing scheme of n product in one session is implemented and the proposed scheme is secure under the presence of malicious participants.The analysis shows that proposed scheme is not only more simple and feasible but also more efficient than previous schemes.…”
Get full text
Article -
2
Peculiarities of State Experts Activity on Secret Issues of the State Penitentiary Service of Ukraine
Published 2020-02-01Get full text
Article -
3
Self-Healing Key-Distribution Scheme with Collusion Attack Resistance Based on One-Way Key Chains and Secret Sharing in Wireless Sensor Networks
Published 2012-09-01“…In wireless sensor networks, self-healing key-distribution schemes are used to ensure that, even if the message packets that are broadcast in some sessions get lost, the group nodes can still recover the lost session keys simply by using their personal secret keys and broadcast messages that have been received without requesting additional transmissions from the group manager. …”
Get full text
Article -
4
-
5
Effectiveness of a Virtual Reality Serious Video Game (The Secret Trail of Moon) for Emotional Regulation in Children With Attention-Deficit/Hyperactivity Disorder: Randomized Clin...
Published 2025-01-01“…In this second randomized clinical trial, we evaluated the impact of a 20-session treatment with MOON on emotional regulation, as measured by the Strengths and Difficulties Questionnaire. …”
Get full text
Article -
6
An Anonymous Routing Protocol with Authenticated Key Establishment in Wireless Ad Hoc Networks
Published 2014-01-01“…Most anonymous routing protocols in ad hoc networks usually assume that a shared secret exists between the sender and the receiver. …”
Get full text
Article -
7
Self-healing group key distribution scheme with revocation based on dual directional hash chain
Published 2009-01-01“…A self-healing group key distribution scheme with revocation in MANET using dual directional hash chain was proposed.The association relation between different session keys was built.By means of broadcast information and own secrets,the legal nodes which lost some legal session keys due to network faults could be capable of recovering such lost session keys on their own,without requiring additional transmission from the group manager.The group manager could revoke the group nodes by revocation polynomial.Node was endowed with a set of masking secret according to its life-cycle.Through the security and efficiency analysis,the key distribution scheme reduces communication cost and storage cost yet still achieves security property.…”
Get full text
Article -
8
Identity-based efficient authentication and key agreement protocol for mobile Internet
Published 2017-08-01“…For the bad computation overhead of bi1inear pairings in e11iptic curve and the prob1ems of certificate management in the PKI,an efficient and secure authentication key agreement protoco1 was proposed based on the identity-based cryptosystem and GDH difficu1t prob1em on the additive group of e11iptic curve.Meanwhi1e,the security of the new protoco1 was proved under the random orac1e mode1.The ana1ysis shows that the new protoco1 meets security properties such as known session key security,perfect forward security,ephemera1 secret 1eakage resistance and the session key escrow resistance.The proposed protoco1 has the good computationa1 overhead for it was ab1e to comp1ete the mutua1 authentication and session key agreement between parties under on1y 5 times sca1ar mu1tip1ication.…”
Get full text
Article -
9
Enhanced ID-Based Authentication Scheme Using OTP in Smart Grid AMI Environment
Published 2014-01-01“…The proposed scheme uses MDMS which is the supervising system located in an electrical company as a time-synchronizing server in order to synchronize smart devices at home and conducts authentication between smart meter and smart devices using a new secret value generated by an OTP generator every session. …”
Get full text
Article -
10
Lightweight terminal cross-domain authentication protocol in edge computing environment
Published 2023-08-01“…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
Get full text
Article -
11
An Intact Dopamine Sensitivity in the Brain: A Necessity to Recover Hyperprolactinemia and Galactorrhea in a Female Hemodialysis Patient?
Published 2017-01-01“…Thus, dopaminergic inhibition of prolactin secretion might be reduced in patients with end-stage renal disease. …”
Get full text
Article -
12
Assessment of Exercise-Induced Dehydration Status Based on Oral Mucosal Moisture in a Field Survey
Published 2024-12-01“…<b>Methods:</b> A total of 21 participants engaged in a 120 min slow distance exercise session. A series of measurements were taken before and after the exercise session, including body weight, sweat rate, secretory immunoglobulin A (s-IgA) concentration in saliva samples, saliva flow rate, and oral mucosal moisture content, which were assessed using a capacitance sensor. …”
Get full text
Article -
13
Results of Gamma Knife Radiosurgery in Acromegaly
Published 2012-01-01“…Objective. Single-session radiosurgery with Gamma Knife (GK) may be a potential adjuvant treatment in acromegaly. …”
Get full text
Article -
14
Role of controlled radial expansion balloon bronchoplasty in benign subglottic and tracheal stenosis
Published 2024-12-01“…Presentations can vary widely, from asymptomatic cases to symptoms such as difficulty clearing secretions and dyspnea on exertion due to airway narrowing. …”
Get full text
Article -
15
Intense Pulsed Light Therapy with Optimal Pulse Technology as an Adjunct Therapy for Moderate to Severe Blepharitis-Associated Keratoconjunctivitis
Published 2019-01-01“…Twenty-one patients received four bilateral OPT therapy sessions with Meibomian gland expression (MGX) (treatment group), and 11 patients received MGX alone (controls). …”
Get full text
Article -
16
Narcolepsy treatment: from exorcism and bloodletting to modern therapy with histamine receptor inverse agonists
Published 2020-09-01“…It was not until the late 20th century, when narcolepsy was perceived as a central hypersomnia due to partial or complete loss of hypocretin-secreting neurons in the hypothalamus, that effective symptomatic treatment emerged. …”
Get full text
Article -
17
Impact of Ramadan Intermittent Fasting on Salivary pH, Flow Rate, and Electrolyte Levels in Healthy Adult Men
Published 2025-02-01“…There is a need for further research on the effects of RIF on saliva secretion.…”
Get full text
Article -
18