Discrepancy Detection in Merkle Tree-Based Hash Aggregation

Author(s):  
Thomas Osterland ◽  
Gordon Lemme ◽  
Thomas Rose
2007 ◽  
Author(s):  
Gordon Moskowitz ◽  
Jeff Stone ◽  
Ruud Custers

2021 ◽  
pp. 115111
Author(s):  
Saima Sadiq ◽  
Muhammad Umer ◽  
Saleem Ullah ◽  
Seyedali Mirjalili ◽  
Vaibhav Rupapara ◽  
...  

2021 ◽  
Vol 219 ◽  
pp. 106871
Author(s):  
Mario José Diván ◽  
María Laura Sánchez-Reynoso
Keyword(s):  

Diagnostics ◽  
2022 ◽  
Vol 12 (1) ◽  
pp. 210
Author(s):  
Aleksandra Asaturova ◽  
Darya Dobrovolskaya ◽  
Alina Magnaeva ◽  
Anna Tregubova ◽  
Guldana Bayramova ◽  
...  

Recent evidence suggests that a cytology–histology correlation (CHC) with discrepancy detection can both evaluate errors and improve the sensitivity and specificity of the cytologic method. We aimed to analyze the errors in cytologic–histologic discrepancies according to the CHC protocol guideline of the American Society of Cytopathology (2017). This retrospective study included 273 patients seen at the National Medical Research Center of Obstetrics, Gynecology and Perinatology (Moscow, Russia) between January 2019 and September 2021. The patients’ mean age was 34 ± 8.1 years. The cytology–histology agreement was noted in 158 cases (57.9%). Major discrepancies were found in 21 cases (7.6%), while minor discrepancies were noted in 93 cases (34.1%). The reason for 13 (4.8%) discrepancies was a colposcopy sampling error and, in 46 (16.8%) cases, the reason was a Papanicolaou (PAP) test sampling error. The discrepancy between primary and reviewed cytology was due interpretive errors in 13 (4.8%) cases and screening errors in 42 (15.4%) cases. We demonstrated that the ASC guidelines facilitate cervical CHC. A uniform application of these guidelines would standardize cervical CHCs internationally, provide a scope for the inter-laboratory comparison of data, and enhance self-learning and peer learning.


Author(s):  
Dharmendra Singh Rajput ◽  
Pankaj Shukla ◽  
Thippa Reddy G. ◽  
Rajesh Kaluri ◽  
Kuruva Lakshmanna ◽  
...  

In today's world, security has become a major issue in our lives, and in this era, one cannot trust the government for handling their lifetime savings. That's where the bitcoin comes to our lives. In this chapter, the authors try to understand one of the famous innovative payment methods (Bitcoin), how it is used and the data structure (Merkle tree) that is used in it. Also, they discuss one of the most recent attacks that involved the use of bitcoin (Wanacry). Further, they try to understand how this hack succeeded in stealing 10,800 euros that is 8,74,290 rs from the hospital with the help of bitcoin. They also discuss the various bitcoin companies now emerging with their own security measures against such hacks.


Sign in / Sign up

Export Citation Format

Share Document