Showing 1 - 18 results of 18 for search 'Secret Obsession~', query time: 4.22s Refine Results
  1. 1

    New secure distributed secret sharing scheme of n product by Zhen-hua CHEN, Shun-dong LI, Bao-cang WANG, Ji-liang LI, Xin LIU

    Published 2014-11-01
    “…Since Shamir’s secret sharing scheme does not have the property of the multiplicative homomorphism,an encoding method is utilized for privacy-preserving data to overcome the drawbacks in secure distributed multiplication calculation when using traditional Shamir’s polynomial to share the product of n secrets.Using this encoding method with multiplicative homomorphism and a commitment scheme supporting additive homomorphism,a new secure distributed secret sharing scheme of n product in one session is implemented and the proposed scheme is secure under the presence of malicious participants.The analysis shows that proposed scheme is not only more simple and feasible but also more efficient than previous schemes.…”
    Get full text
    Article
  2. 2
  3. 3

    Self-Healing Key-Distribution Scheme with Collusion Attack Resistance Based on One-Way Key Chains and Secret Sharing in Wireless Sensor Networks by Dong Jiao, Mingchu Li, Yan Yu, Jinping Ou

    Published 2012-09-01
    “…In wireless sensor networks, self-healing key-distribution schemes are used to ensure that, even if the message packets that are broadcast in some sessions get lost, the group nodes can still recover the lost session keys simply by using their personal secret keys and broadcast messages that have been received without requesting additional transmissions from the group manager. …”
    Get full text
    Article
  4. 4
  5. 5

    Effectiveness of a Virtual Reality Serious Video Game (The Secret Trail of Moon) for Emotional Regulation in Children With Attention-Deficit/Hyperactivity Disorder: Randomized Clin... by Marina Martin-Moratinos, Marcos Bella-Fernández, María Rodrigo-Yanguas, Carlos González-Tardón, Chao Li, Ping Wang, Ana Royuela, Pilar Lopez-Garcia, Hilario Blasco-Fontecilla

    Published 2025-01-01
    “…In this second randomized clinical trial, we evaluated the impact of a 20-session treatment with MOON on emotional regulation, as measured by the Strengths and Difficulties Questionnaire. …”
    Get full text
    Article
  6. 6

    An Anonymous Routing Protocol with Authenticated Key Establishment in Wireless Ad Hoc Networks by Wei Yuan

    Published 2014-01-01
    “…Most anonymous routing protocols in ad hoc networks usually assume that a shared secret exists between the sender and the receiver. …”
    Get full text
    Article
  7. 7

    Self-healing group key distribution scheme with revocation based on dual directional hash chain by DU Chun-lai1, HU Ming-zeng2, ZHANG Hong-li2, ZHANG Dong-yan2

    Published 2009-01-01
    “…A self-healing group key distribution scheme with revocation in MANET using dual directional hash chain was proposed.The association relation between different session keys was built.By means of broadcast information and own secrets,the legal nodes which lost some legal session keys due to network faults could be capable of recovering such lost session keys on their own,without requiring additional transmission from the group manager.The group manager could revoke the group nodes by revocation polynomial.Node was endowed with a set of masking secret according to its life-cycle.Through the security and efficiency analysis,the key distribution scheme reduces communication cost and storage cost yet still achieves security property.…”
    Get full text
    Article
  8. 8

    Identity-based efficient authentication and key agreement protocol for mobile Internet by Zhen WANG, Zhao-feng MA, Shou-shan LUO

    Published 2017-08-01
    “…For the bad computation overhead of bi1inear pairings in e11iptic curve and the prob1ems of certificate management in the PKI,an efficient and secure authentication key agreement protoco1 was proposed based on the identity-based cryptosystem and GDH difficu1t prob1em on the additive group of e11iptic curve.Meanwhi1e,the security of the new protoco1 was proved under the random orac1e mode1.The ana1ysis shows that the new protoco1 meets security properties such as known session key security,perfect forward security,ephemera1 secret 1eakage resistance and the session key escrow resistance.The proposed protoco1 has the good computationa1 overhead for it was ab1e to comp1ete the mutua1 authentication and session key agreement between parties under on1y 5 times sca1ar mu1tip1ication.…”
    Get full text
    Article
  9. 9

    Enhanced ID-Based Authentication Scheme Using OTP in Smart Grid AMI Environment by Sang-Soo Yeo, Dae-il Park, Young-Ae Jung

    Published 2014-01-01
    “…The proposed scheme uses MDMS which is the supervising system located in an electrical company as a time-synchronizing server in order to synchronize smart devices at home and conducts authentication between smart meter and smart devices using a new secret value generated by an OTP generator every session. …”
    Get full text
    Article
  10. 10

    Lightweight terminal cross-domain authentication protocol in edge computing environment by Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG

    Published 2023-08-01
    “…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
    Get full text
    Article
  11. 11
  12. 12

    Assessment of Exercise-Induced Dehydration Status Based on Oral Mucosal Moisture in a Field Survey by Gen Tanabe, Tetsuya Hasunuma, Yasuo Takeuchi, Hiroshi Churei, Kairi Hayashi, Kaito Togawa, Naoki Moriya, Toshiaki Ueno

    Published 2024-12-01
    “…<b>Methods:</b> A total of 21 participants engaged in a 120 min slow distance exercise session. A series of measurements were taken before and after the exercise session, including body weight, sweat rate, secretory immunoglobulin A (s-IgA) concentration in saliva samples, saliva flow rate, and oral mucosal moisture content, which were assessed using a capacitance sensor. …”
    Get full text
    Article
  13. 13

    Results of Gamma Knife Radiosurgery in Acromegaly by Alberto Franzin, Giorgio Spatola, Marco Losa, Piero Picozzi, Pietro Mortini

    Published 2012-01-01
    “…Objective. Single-session radiosurgery with Gamma Knife (GK) may be a potential adjuvant treatment in acromegaly. …”
    Get full text
    Article
  14. 14

    Role of controlled radial expansion balloon bronchoplasty in benign subglottic and tracheal stenosis by Jeetendra Kumar Patra, Chinmaya Sundar Ray, Manoranjan Pattnaik, Subrat Kumar Behera

    Published 2024-12-01
    “…Presentations can vary widely, from asymptomatic cases to symptoms such as difficulty clearing secretions and dyspnea on exertion due to airway narrowing. …”
    Get full text
    Article
  15. 15

    Intense Pulsed Light Therapy with Optimal Pulse Technology as an Adjunct Therapy for Moderate to Severe Blepharitis-Associated Keratoconjunctivitis by Fang Ruan, Yunxiao Zang, Ruti Sella, Hongshuang Lu, Shang Li, Ke Yang, Tao Jin, Natalie A. Afshari, Zhiqiang Pan, Ying Jie

    Published 2019-01-01
    “…Twenty-one patients received four bilateral OPT therapy sessions with Meibomian gland expression (MGX) (treatment group), and 11 patients received MGX alone (controls). …”
    Get full text
    Article
  16. 16

    Narcolepsy treatment: from exorcism and bloodletting to modern therapy with histamine receptor inverse agonists by E. Sakalauskaitė-Juodeikienė, R. Masaitienė

    Published 2020-09-01
    “…It was not until the late 20th century, when narcolepsy was perceived as a central hypersomnia due to partial or complete loss of hypocretin-secreting neurons in the hypothalamus, that effective symptomatic treatment emerged. …”
    Get full text
    Article
  17. 17

    Impact of Ramadan Intermittent Fasting on Salivary pH, Flow Rate, and Electrolyte Levels in Healthy Adult Men by Sinda Yacoub, Mehdi Khemiss, Amira Besbes, Helmi Ben Saad

    Published 2025-02-01
    “…There is a need for further research on the effects of RIF on saliva secretion.…”
    Get full text
    Article
  18. 18