Results 71 to 80 of about 133,735 (361)

Clinical Course and Impact of Breaks in Therapy for Children With Relapsed/Refractory Solid Tumors

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction Pediatric relapsed or refractory (R/R) solid tumors carry a dismal prognosis, and postrelapse patient experiences are not well described. We present postrelapse outcomes, including number of R/R events and subsequent therapy regimens.
Matthew T. McEvoy   +5 more
wiley   +1 more source

Fruit-80: A Secure Ultra-Lightweight Stream Cipher for Constrained Environments

open access: yesEntropy, 2018
In Fast Software Encryption (FSE) 2015, while presenting a new idea (i.e., the design of stream ciphers with the small internal state by using a secret key, not only in the initialization but also in the keystream generation), Sprout was proposed. Sprout
V. Ghafari, Honggang Hu
semanticscholar   +1 more source

Eliminating Variables in Boolean Equation Systems [PDF]

open access: yes, 2017
Systems of Boolean equations of low degree arise in a natural way when analyzing block ciphers. The cipher's round functions relate the secret key to auxiliary variables that are introduced by each successive round.
Fløystad, Gunnar   +3 more
core   +1 more source

Criterion‐Related Validity of the Neuropsychological Quick Assessment for Screening Cognitive, Motor, and Behavioral Impairments in Patients With Pediatric Brain Tumors: An Observational Pilot Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Neuropsychological complications may impair the qualitative prognosis of patients with pediatric brain tumors. However, multifaceted evaluations cannot be conducted in all patients because they are time consuming and burdensome for patients.
Ami Tabata   +9 more
wiley   +1 more source

Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices

open access: yesIEEE Access
The Internet of Things (IoT) is growing rapidly, enabling interconnected devices to communicate and share data seamlessly. While this expansion drives significant advancements across industries, it also introduces critical challenges in ensuring secure ...
Gabriela Cagua   +2 more
doaj   +1 more source

KRIPTOGRAFI DENGAN KOMPOSISI CAESAR CIPHER DAN AFFINE CIPHER UNTUK MENGUBAH PESAN RAHASIA [PDF]

open access: yes, 2016
Kriptografi caesar cipher dan affine cipher adalah kriptografi yang sederhana dan mudah dipecahkan. Salah satu cara agar pesan menjadi sulit dipecahkan yaitu dengan cara mengkomposisi kedua cipher tersebut. Komposisi kriptografi caesar cipher dan affine
Wijaya, Muhammad Lutfi
core  

The Efficacy and Safety of Bevacizumab/Irinotecan/Temozolomide (BIT) for Relapsed/Refractory Neuroblastoma: The UK Children's Cancer and Leukaemia Group Experience

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Patients with high‐risk neuroblastoma who either are refractory to induction chemotherapy or relapse following multi‐modal treatment have a dismal prognosis. Based on data from the BEACON trial, since 2021 the UK national guidelines recommend bevacizumab, irinotecan, and temozolomide (BIT) for patients with relapsed/refractory ...
Thomas J. Jackson   +20 more
wiley   +1 more source

Encryption of a Message by HillAli Cipher and Security of Routing Path by DSR in Wireless Sensor Network

open access: yesJournal of Communications Software and Systems
A Wireless Sensor Network (WSN) is a collection of sensors that communicate or track a specific object. It is used in many fields of war, architecture, or espionage, but the wireless sensor network faces challenges in securing the path or the message ...
Haneen Mohammed Hussein   +2 more
doaj   +1 more source

Novel GRIA2 variant in a patient with atypical autism spectrum disorder and psychiatric symptoms: a case report

open access: yesBMC Pediatrics, 2022
Background As sequencing technology has advanced in recent years, a series of synapse-related gene variants have been reported to be associated with autism spectrum disorders (ASDs).
Qianyun Cai   +6 more
doaj   +1 more source

The New Block Cipher Design (Tigris Cipher) [PDF]

open access: yesInternational Journal of Computer Network and Information Security, 2015
Abstract—In the present paper we have proposed a new variant of AES cipher with high level of security and an elegant construction called TIGRIS cipher. The TIGRIS name has been derived from one of the two famous rivers in Iraq. The proposed TIGRIS cipher is a revision for the proposed Euphrates cipher which has already been published.
Omar A. Dawood   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy