![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessClinical pitfalls and serological diagnostics of MuSK myasthenia gravis
We aimed to evaluate the diagnostic accuracy of enzyme-linked immunosorbent assay (ELISA) for anti-muscle specific tyrosine kinase (MuSK) antibody (Ab) in a large cohort of anti-acetylcholine receptor (AChR) A...
-
Article
Integrated analysis of miRNA and mRNA reveals that acrolein modulates GPI anchor biosynthesis in human primary endothelial cells
Acrolein (ACR) is a highly reactive α, β-unsaturated carbonyl compound that is related to several diabetic vascular complications. ACR, a ubiquitous aldehyde pollutant, is a product of incomplete combustion re...
-
Chapter and Conference Paper
Cryptanalytic Flaws in Oh et al.’s ID-Based Authenticated Key Agreement Protocol
A key agreement protocol is designed for two or more entities to agree upon a shared secret key, which is used to preserve confidentiality and data integrity over an open network. In 2007, Oh et al. proposed a...
-
Chapter and Conference Paper
A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves
Key agreement protocol is of fundamental importance in providing data confidentiality and integrity between two or more parties over an insecure network. In 2004, Popescu [14] proposed an authenticated key agr...
-
Chapter and Conference Paper
An Enhanced One-Round Pairing-Based Tripartite Authenticated Key Agreement Protocol
A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secret key, which is used to prese...
-
Chapter and Conference Paper
An Enhanced ID-Based Deniable Authentication Protocol on Pairings
Deniability is defined as a privacy property which enables protocol principals to deny their involvement after they had taken part in a particular protocol run. Lately, Chou et al. had proposed their ID-based ...
-
Chapter and Conference Paper
A Secure DRM Framework for User’s Domain and Key Management
Digital rights management(DRM) systems are used to control the use and distribution of copyrighted content. OMA specification creates devices collection of domain, and the use of contents is free in this domai...
-
Chapter and Conference Paper
Cryptanalysis of Tso et al.’s ID-Based Tripartite Authenticated Key Agreement Protocol
A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secret key, which is used to prese...
-
Chapter and Conference Paper
Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves
Joux’s tripartite key agreement protocol is one of the most prominent developments in the area of key agreement. Although certificate-based and ID-based authentication schemes have been proposed to provide aut...