50 research outputs found
An Undetachable Threshold Digital Signature Scheme Based on Conic Curves
Based on analysis of security problems on malicious hosts, a special undetachable threshold digital signature scheme is proposed. This scheme uses a cryptosystem based on conic curves and achieves the most important security characteristic of protecting mobile agents against malicious hosts, i.e., undetachablility. Furthermore, this scheme solves the case where a host can force an agent to commit to a sub-optimal transaction. Computational studies show that this scheme is superior to the RSA-based undetachable threshold digital signature scheme
RealāTime Monitoring of Wound States via Rationally Engineered Biosensors
Abstract Current strategies for realātime wound monitoring have limited applicability and therapeutic efficiency due to the reliance on clinician experience and timeāconsuming laboratory analysis requirements. In this article, an educational review is provided on the accumulated knowledge of wound healing, such as the characterization of acute and chronic wounds, the four main stages of wound healing, and the factors that influence wound healing. The current stateāofātheāart wound state sensing methods are presented and reviewed, with particular attention paid to the realātime monitoring of pH, biofilms, electrophysiological signals, temperature, and reactive oxygen species. It is expected that the presentation of this evolving field will contribute to deepen the existing understanding of wounds and steer wound treatment toward realātime precision to drive further and faster development of clinically valuable technologies