Zobrazeno 1 - 10
of 96
pro vyhledávání: '"Toft, Tomas"'
Interest in anonymous communication over distributed hash tables (DHTs) has increased in recent years. However, almost all known solutions solely aim at achieving sender or requestor anonymity in DHT queries. In many application scenarios, it is cruc
Externí odkaz:
http://arxiv.org/abs/1107.1072
Publikováno v:
Psychotherapy and Psychosomatics, 2010 Jan 01. 79(4), 227-237.
Externí odkaz:
https://www.jstor.org/stable/48511269
Autor:
Frostholm, Lisbeth, Oernboel, Eva, Christensen, Kaj S., Toft, Tomas, Olesen, Frede, Weinman, John, Fink, Per
Publikováno v:
In Journal of Psychosomatic Research 2007 62(2):129-138
MOESM2 of Vitamin D3 supplementation and treatment outcomes in patients with depression (D3-vit-dep)
Autor:
Hansen, Jens, Manan Pareek, Hvolby, Allan, Schmedes, Anne, Toft, Tomas, Dahl, Erik, Nielsen, Connie
Additional file 2: Table S2. Correlations between serum 25(OH)D and selected outcomes. Correlations between Vitamin D and Hamilton, WHO-5, MDI, Systolic blood pressure and Waist circumference including p-values.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::64916a27647da8e1b22112762d9f1f09
Autor:
Hansen, Jens Peter, Pareek, Manan, Hvolby, Allan, Schmedes, Anne, Toft, Tomas, Dahl, Erik, Nielsen, Connie Thurøe
Publikováno v:
Hansen, J P, Pareek, M, Hvolby, A, Schmedes, A, Toft, T, Dahl, E & Nielsen, C T 2019, ' Vitamin D3 supplementation and treatment outcomes in patients with depression ', 19th WPA World Congress of Psychyatry, Lisbon, Portugal, 21/08/2019-24/11/2019 . < https://cmoffice.kenes.com/cmsearchableprogrammeV15/conferencemanager/programme/personid/anonymous/wcp19/normal/b833d15f547f3cf698a5e922754684fa334885ed#!abstractdetails/0000460050 >
Objective: To examine whether vitamin D supplementation in patients with depression would result in a reduction in Hamilton D-17 depression score (primary outcome) at 3 and 6 months compared to controls and to explore the correlations between serum v
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______3062::3033b99792be8c755cb14ebf8ebbf44e
https://cmoffice.kenes.com/cmsearchableprogrammeV15/conferencemanager/programme/personid/anonymous/wcp19/normal/b833d15f547f3cf698a5e922754684fa334885ed#!abstractdetails/0000460050
https://cmoffice.kenes.com/cmsearchableprogrammeV15/conferencemanager/programme/personid/anonymous/wcp19/normal/b833d15f547f3cf698a5e922754684fa334885ed#!abstractdetails/0000460050
Publikováno v:
In Psychosomatics 2002 43(2):93-131
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Damgård, I, Damgård, K, Nielsen, K, Nordholt, P S & Toft, T 2017, Confidential benchmarking based on multiparty computation . in J Grossklags & B Preneel (eds), Financial Cryptography and Data Security-20th International Conference, FC 2016, Revised Selected Papers . vol. 9603 LNCS, Springer VS, Lecture Notes in Computer Science, vol. 9603, pp. 169-187, 20th International Conference on Financial Cryptography and Data Security, FC 2016, Christ Church, Barbados, 22/02/2016 . https://doi.org/10.1007/978-3-662-54970-4_10
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=pure_au_____::5ce3302211a90b2b88c3dd01efc4ef05
https://pure.au.dk/portal/da/publications/confidential-benchmarking-based-on-multiparty-computation(626cee70-d578-4bd1-b65d-d53a9446048f).html
https://pure.au.dk/portal/da/publications/confidential-benchmarking-based-on-multiparty-computation(626cee70-d578-4bd1-b65d-d53a9446048f).html
Publikováno v:
Theory of Cryptography (Proceedings 3rd Theory of Cryptography Conference, TCC 2006, New York NY, USA, March 4-7, 2006), 285-304
STARTPAGE=285;ENDPAGE=304;TITLE=Theory of Cryptography (Proceedings 3rd Theory of Cryptography Conference, TCC 2006, New York NY, USA, March 4-7, 2006)
Theory of Cryptography ISBN: 9783540327318
TCC
STARTPAGE=285;ENDPAGE=304;TITLE=Theory of Cryptography (Proceedings 3rd Theory of Cryptography Conference, TCC 2006, New York NY, USA, March 4-7, 2006)
Theory of Cryptography ISBN: 9783540327318
TCC
We show that if a set of players hold shares of a value $a \in \mathbb{F}_p $ for some prime p (where the set of shares is written [a]p), it is possible to compute, in constant rounds and with unconditional security, sharings of the bits of a, i.e.,
Autor:
Toft, Tomas
Publikováno v:
Toft, T 2014, A secure priority queue; or : On secure datastructures from multiparty computation . in H-S Lee & D-G Han (eds), Information Security and Cryptology--ICISC 2013 : 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers . vol. 8565, Springer, Lecture Notes in Computer Science, vol. 8565, pp. 20-33, Seoul, Korea, Republic of, 27/11/2013 . https://doi.org/10.1007/978-3-319-12160-4_2
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=pure_au_____::27552125e065aabbdf21937534a55c38
https://pure.au.dk/portal/da/publications/a-secure-priority-queue-or(b8b9c2e8-42fb-4b8c-affb-1c9f0516480a).html
https://pure.au.dk/portal/da/publications/a-secure-priority-queue-or(b8b9c2e8-42fb-4b8c-affb-1c9f0516480a).html