Dennis Jackson

ORCID: 0000-0003-3067-7816
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Authentication Protocols Security
  • COVID-19 Digital Contact Tracing
  • Cryptography and Data Security
  • Digital Rights Management and Security
  • Differential Equations and Boundary Problems
  • Privacy-Preserving Technologies in Data
  • User Authentication and Security Systems
  • Privacy, Security, and Data Protection
  • Cryptographic Implementations and Security
  • Stability and Controllability of Differential Equations
  • Human Mobility and Location-Based Analysis
  • Advanced Mathematical Modeling in Engineering
  • COVID-19 epidemiological studies
  • Healthcare and Environmental Waste Management
  • Radioactive Decay and Measurement Techniques
  • Caveolin-1 and cellular processes
  • Graph theory and applications
  • Wastewater Treatment and Reuse
  • Spinal Dysraphism and Malformations
  • Mobile Health and mHealth Applications
  • Orbital Angular Momentum in Optics
  • Value Engineering and Management
  • Municipal Solid Waste Management
  • Limits and Structures in Graph Theory
  • Angiogenesis and VEGF in Cancer

ETH Zurich
2020-2021

University of Oxford
2019-2020

Duke Medical Center
2006

Florida Institute of Technology
1990-2002

Northwestern University
1994

Eastern New Mexico University
1980-1985

University of Alberta
1969

10.21136/cmj.1976.101401 article EN Czechoslovak Mathematical Journal 1976-01-01

This document describes and analyzes a system for secure privacy-preserving proximity tracing at large scale. system, referred to as DP3T, provides technological foundation help slow the spread of SARS-CoV-2 by simplifying accelerating process notifying people who might have been exposed virus so that they can take appropriate measures break its transmission chain. The aims minimise privacy security risks individuals communities guarantee highest level data protection. goal our is determine...

10.48550/arxiv.2005.12273 preprint EN cc-by arXiv (Cornell University) 2020-01-01

In many mammalian species, the placenta is site of synthesis proteins in prolactin and growth hormone family. Analysis two such proteins, proliferin (PLF) proliferin-related protein (PRP), revealed that they are potent regulators angiogenesis; PLF stimulated PRP inhibited endothelial cell migration culture neovascularization vivo. The mouse secretes an angiogenic activity during middle pregnancy corresponds primarily to PLF, but later gestation releases a factor inhibits angiogenesis, which...

10.1126/science.7527157 article EN Science 1994-12-02

In the wake of pandemic coronavirus disease 2019 (COVID-19), contact tracing has become a key element strategies to control spread severe acute respiratory syndrome coronavirus-2 (SARS-CoV-2). Given rapid and intense SARS-CoV-2, digital emerged as potential complementary tool support containment mitigation efforts. Early modelling studies highlighted break transmission chains, Google Apple subsequently developed Exposure Notification (EN) framework, making it available vast majority...

10.4414/smw.2020.20457 article EN cc-by Schweizerische medizinische Wochenschrift 2020-12-16

Five patients with a continuous band of heterotopic neurons between the lateral ventricles and cerebral cortex are described. All presented intractable seizures moderate-to-severe developmental delay. The identification this anomaly is difficult because its symmetry minimal abnormality gyral pattern cortex. possible embryogenesis discussed. these heterotopias important nature seizure disorder poor prognosis for patient.

10.1148/radiology.171.2.2468173 article EN Radiology 1989-05-01

A standard requirement for a signature scheme is that it existentially unforgeable under chosen message attacks (EUF-CMA), alongside other properties of interest such as strong unforgeability (SUF-CMA), and resilience against key substitution attacks.Remarkably, no detailed proofs have ever been given these security EdDSA, in particular its Ed25519 instantiations. one the most efficient widely used schemes, different instantiations are protocols TLS 1.3, SSH, Tor, ZCash, WhatsApp/Signal. The...

10.1109/sp40001.2021.00042 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2021-05-01

10.1006/jmaa.1993.1022 article EN publisher-specific-oa Journal of Mathematical Analysis and Applications 1993-01-01

Abstract In the wake of pandemic coronavirus disease 2019 (COVID-19), contact tracing has become a key element strategies to control spread severe acute respiratory syndrome (SARS-CoV-2). Given rapid and intense SARS-CoV-2, digital emerged as potential complementary tool support containment mitigation efforts. Early modelling studies highlighted break transmission chains, Google Apple subsequently developed Exposure Notification (EN) framework, making it available vast majority smartphones....

10.1101/2020.09.07.20189274 preprint EN cc-by-nc-nd medRxiv (Cold Spring Harbor Laboratory) 2020-09-09

The standard definition of security for digital signatures - existential unforgeability does not ensure certain properties that protocol designers might expect. For example, in many modern signature schemes, one may verify against multiple distinct public keys. It is left to the absence these lead attacks.

10.1145/3319535.3339813 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2019-11-06

Diffie-Hellman groups are a widely used component in cryptographic protocols which shared secret is needed. These typically proven to be secure under the assumption they implemented with prime order Diffie Hellman groups. However, practice, many implementations either choose use non-prime for reasons of efficiency, or can manipulated into operating This leaves gap between proofs protocol security, assume groups, and real world implementations. not merely theoretical possibility: attacks...

10.1109/csf.2019.00013 article EN 2019-06-01

Research Article| November 01, 1969 Siluro-Devonian Boundary in North America1 J. M BERDAN; BERDAN U.S. Geological Surrey, E-501 National Museum, Washington, D.C. Search for other works by this author on: GSW Google Scholar W. B. N BERRY; BERRY Department of Paleontology, University California, Berkeley, California A. J BOUCOT; BOUCOT Geology, Pennsylvania, Philadelphia, Pennsylvania PRESENT ADDRESS: OREGON STATE UNIVERSITY, CORVALLIS, (BOUCOT AND JOHNSON) G. A COOPER; COOPER D. E JACKSON;...

10.1130/0016-7606(1969)80[2165:sbina]2.0.co;2 article EN Geological Society of America Bulletin 1969-01-01

10.1016/0012-365x(80)90110-7 article EN Discrete Mathematics 1980-01-01

10.5555/uri:pii:s0022214340906837 article EN Journal of Laboratory and Clinical Medicine 1940-10-01

11505 Background: Glioblastomas are highly lethal cancers that resist current therapies. Focal adhesion kinase (FAK) is a non-receptor tyrosine overexpressed in glioblastoma patient specimens may promote glioma growth and invasion by increasing cellular adhesion, migration, invasion, proliferation. TAE226 novel low molecular weight inhibitor of several kinases demonstrates vitro activity primarily against FAK with insulin-like factor-1 receptor (IGF1R) at higher concentrations. Methods: As...

10.1200/jco.2006.24.18_suppl.11505 article EN Journal of Clinical Oncology 2006-06-20

Verification techniques have been applied to the design of secure protocols for decades. However, relatively few efforts made ensure that verified designs are also implemented securely. Static code verification offer one way bridge gap between and implementation, but require substantial expertise manual labor realize in practice. In this short paper, we propose black-box runtime as an alternative approach extend security guarantees protocol their implementations. Instead instrumenting...

10.1145/3411506.3417596 article EN 2020-11-02
Coming Soon ...