Learn More
Previous studies propose that associative classification has high classification accuracy and strong flexibility at handling unstructured data. However, it still suffers from the huge set of mined rules and sometimes biased classification or overfitting since the classification is based on only single high-confidence rule. In this study, we propose a new(More)
With advancement of computer community and widespread dissemination of network applications, users generally need multiple servers to provide different services. Accordingly, the multiserver architecture has been prevalent, and designing a secure and efficient remote user authentication under multiserver architecture becomes a nontrivial challenge. In last(More)
Healthcare delivery services via telecare medicine information systems (TMIS) can help patients to obtain their desired telemedicine services conveniently. However, information security and privacy protection are important issues and crucial challenges in healthcare information systems, where only authorized patients and doctors can employ telecare medicine(More)
Value-added applications in vehicular ad hoc network (VANET) come with the emergence of electronic trading. The restricted connectivity scenario in VANET, where the vehicle cannot communicate directly with the bank for authentication due to the lack of internet access, opens up new security challenges. Hence a secure payment protocol, which meets the(More)
Telecare medical information system (TMIS) offers healthcare delivery services and patients can acquire their desired medical services conveniently through public networks. The protection of patients’ privacy and data confidentiality are significant. Very recently, Mishra et al. proposed a biometrics-based authentication scheme for telecare medical(More)
OBJECTIVE The purpose of this systematic review and meta-analysis of randomised controlled trials (RCTs) was to evaluate the effect of pain control of pregabalin versus placebo after a total knee arthroplasty (TKA). METHODS The electronic databases: Medline, Embase, PubMed, CENTRAL (Cochrane Controlled Trials Register), Web of Science and Google were(More)
In the cloud, for achieving access control and keeping data confidential, the data owners could adopt attribute-based encryption to encrypt the stored data. Users with limited computing power are however more likely to delegate the mask of the decryption task to the cloud servers to reduce the computing cost. As a result, attribute-based encryption with(More)
Heparanase (HPSE), an endo-β-D-glucuronidase, is overexpressed in nasopharyngeal carcinoma (NPC). The purpose of our study was to investigate the possible role of HPSE in the development of NPC. RNA interference (RNAi) using an HPSE small hairpin RNA (HPSE shRNA) was used to identify the effects of HPSE on the regulation of the malignant behaviors of NPC.(More)
The main idea of the verifier-based protocol is to mitigate the amount of damage that can be caused by corruptions in the server. Some verifier-based PAKE protocols in the three-party have been suggested by now. In this paper, we present a verifier-based PAKE in the three party based on ECC which is secure against several attacks and provides perfect(More)