50 research outputs found

    An Undetachable Threshold Digital Signature Scheme Based on Conic Curves

    No full text
    Based on analysis of security problems on malicious hosts, a special undetachable threshold digital signature scheme is proposed. This scheme uses a cryptosystem based on conic curves and achieves the most important security characteristic of protecting mobile agents against malicious hosts, i.e., undetachablility. Furthermore, this scheme solves the case where a host can force an agent to commit to a sub-optimal transaction. Computational studies show that this scheme is superior to the RSA-based undetachable threshold digital signature scheme

    Realā€Time Monitoring of Wound States via Rationally Engineered Biosensors

    No full text
    Abstract Current strategies for realā€time wound monitoring have limited applicability and therapeutic efficiency due to the reliance on clinician experience and timeā€consuming laboratory analysis requirements. In this article, an educational review is provided on the accumulated knowledge of wound healing, such as the characterization of acute and chronic wounds, the four main stages of wound healing, and the factors that influence wound healing. The current stateā€ofā€theā€art wound state sensing methods are presented and reviewed, with particular attention paid to the realā€time monitoring of pH, biofilms, electrophysiological signals, temperature, and reactive oxygen species. It is expected that the presentation of this evolving field will contribute to deepen the existing understanding of wounds and steer wound treatment toward realā€time precision to drive further and faster development of clinically valuable technologies
    corecore