Results 41 to 50 of about 20,803 (281)

Why and When Are Evidence‐Based Interventions Adopted in Paediatric Supportive Care? A Qualitative Exploration of the Determinants of Photobiomodulation Implementation

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Oral mucositis is a common and debilitating side effect of childhood cancer and stem cell transplant treatments. It affects the quality of life of children and young people (CYP) and places a strain on services. Photobiomodulation is recommended for oral mucositis prevention in international guidance but is poorly implemented in UK ...
Claudia Heggie   +4 more
wiley   +1 more source

Best Effort and Practice Activation Codes [PDF]

open access: yes, 2010
Activation Codes are used in many different digital services and known by many different names including voucher, e-coupon and discount code. In this paper we focus on a specific class of ACs that are short, human-readable, fixed-length and represent ...
Furnell, S.   +4 more
core   +4 more sources

Preferences of Pediatric Patients and Their Caregivers for Chemotherapy‐Induced Nausea and Vomiting Control Endpoints: A Mixed Methods Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Although not always achieved, complete chemotherapy‐induced nausea and vomiting (CINV) control is the conventional goal of CINV prophylaxis. In this two‐center, mixed‐methods study, we sought to understand the preferences of adolescent patients and family caregivers for CINV control endpoints.
Haley Newman   +8 more
wiley   +1 more source

Quantum differential cryptanalysis to the block ciphers

open access: yes, 2015
Differential cryptanalysis is one of the most popular methods in attacking block ciphers. However, there still some limitations in traditional differential cryptanalysis.
Li, Hong-Wei, Yang, Li
core   +1 more source

A fast and light stream cipher for smartphones [PDF]

open access: yes, 2013
We present a stream cipher based on a chaotic dynamical system. Using a chaotic trajectory sampled under certain rules in order to avoid any attempt to reconstruct the original one, we create a binary pseudo-random keystream that can only be exactly ...
Baptista, Murilo   +2 more
core   +1 more source

NRASQ61R Expression in Lymphatic Endothelial Cells Causes Enlarged Vessels, Hemorrhagic Chylous Effusions, and High Mortality in a Mouse Model of Kaposiform Lymphangiomatosis

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Kaposiform lymphangiomatosis (KLA) is an aggressive complex lymphatic anomaly. Patients exhibit malformed lymphatic vessels and often develop hemorrhagic effusions and elevated angiopoietin‐2 (Ang‐2) levels. A somatic NRAS p.Q61R (NRASQ61R) mutation has been associated with KLA.
C. Griffin McDaniel   +3 more
wiley   +1 more source

Efficient constructions for large‐state block ciphers based on AES New Instructions

open access: yesIET Information Security, 2022
Large‐state block ciphers with 256 bits or 512 bits block sizes receive much attention from the viewpoint of long‐term security. Existing large‐state block ciphers, such as Haraka‐v2 and Pholkos, consist of only the AES New Instructions set (AES‐NI) and ...
Rentaro Shiba   +2 more
doaj   +1 more source

The vulnerability analysis and the security evaluation of block ciphers [PDF]

open access: yes, 2010
The first step for evaluation of block ciphers is the confidence on attainment of some properties such as completeness, strict avalanche criterion and static information leakage.
Md. Said, Mohamad Rushdan   +1 more
core  

The Role of Invasive Procedures in the Treatment of Complicated Gastrointestinal Graft‐Versus‐Host Disease in Pediatric Patients

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Gastrointestinal graft‐versus‐host disease (GI GVHD) following hematopoietic stem cell transplant is typically managed with medical therapy, but surgery and angioembolization may be warranted in selected cases with life‐threatening complications.
Gaia Brunetti   +12 more
wiley   +1 more source

Improved rotational‐XOR cryptanalysis of Simon‐like block ciphers

open access: yesIET Information Security, 2022
Rotational‐XOR (RX) cryptanalysis is a cryptanalytic method aimed at finding distinguishable statistical properties in Addition‐Rotation‐XOR‐C ciphers, that is, ciphers that can be described only by using modular addition, cyclic rotation, XOR and the ...
Jinyu Lu   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy