Results 41 to 50 of about 177,532 (270)

Stressful Events Reported by Childhood Cancer Survivors and Community Controls From the St. Jude Lifetime (SJLIFE) Cohort: A Mixed Method Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction Characterizing stressful events reported by childhood cancer survivors experienced throughout the lifespan may help improve trauma‐informed care relevant to the survivor experience. Methods Participants included 2552 survivors (54% female; 34 years of age) and 469 community controls (62% female; 33 years of age) from the St.
Megan E. Ware   +13 more
wiley   +1 more source

Design and implementation of an energy-efficient Keccak algorithm ASIC

open access: yesDianzi Jishu Yingyong, 2019
The complete hardware circuit of Keccak algorithm which can support the four modes of SHA3 is designed and implemented. Based on the detailed analysis of the sponge functions and Keccak algorithm, the modular idea is used to divide the circuit structure ...
Tuo Zhao, Chen Tao, Li Wei, Nan Longmei
doaj   +1 more source

Learning with Errors is easy with quantum samples

open access: yes, 2018
Learning with Errors is one of the fundamental problems in computational learning theory and has in the last years become the cornerstone of post-quantum cryptography.
Grilo, Alex B.   +2 more
core   +2 more sources

Exploring Preferences for a Digital Single‐Session Intervention for Adolescent Siblings of Youth With Cancer

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction Adolescent siblings of children with cancer are at elevated risk for psychosocial problems. Unfortunately, various barriers such as limited family time and resources, conflicting schedules, and psychosocial staffing constraints at cancer centers hinder sibling access to support.
Christina M. Amaro   +10 more
wiley   +1 more source

Asymmetric Cryptography

open access: yesIrish Mathematical Society Bulletin, 1988
This short survey article reviews progress in asymmetric (or public-key) cryptography. Knapsack methods are described along with the successful attacks by Shamir and others. The RSA method and certain generalisations are also considered.
openaire   +2 more sources

Clinical Course and Impact of Breaks in Therapy for Children With Relapsed/Refractory Solid Tumors

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction Pediatric relapsed or refractory (R/R) solid tumors carry a dismal prognosis, and postrelapse patient experiences are not well described. We present postrelapse outcomes, including number of R/R events and subsequent therapy regimens.
Matthew T. McEvoy   +5 more
wiley   +1 more source

Tomographic Quantum Cryptography

open access: yes, 2003
We present a protocol for quantum cryptography in which the data obtained for mismatched bases are used in full for the purpose of quantum state tomography.
A. Beige   +28 more
core   +1 more source

The Efficacy and Safety of Bevacizumab/Irinotecan/Temozolomide (BIT) for Relapsed/Refractory Neuroblastoma: The UK Children's Cancer and Leukaemia Group Experience

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Patients with high‐risk neuroblastoma who either are refractory to induction chemotherapy or relapse following multi‐modal treatment have a dismal prognosis. Based on data from the BEACON trial, since 2021 the UK national guidelines recommend bevacizumab, irinotecan, and temozolomide (BIT) for patients with relapsed/refractory ...
Thomas J. Jackson   +20 more
wiley   +1 more source

An enhanced state-aware model learning approach for security analysis in lightweight protocol implementations

open access: yesJournal of Cloud Computing: Advances, Systems and Applications
Owing to the emergence and rapid advances of new-generation information and digitalization technologies, the concept of model-driven digital twin has received widespread attentions and is developing vigorously.
Jiaxing Guo   +5 more
doaj   +1 more source

Counterfactual Quantum Cryptography

open access: yes, 2008
Quantum cryptography allows one to distribute a secret key between two remote parties using the fundamental principles of quantum mechanics. The well-known established paradigm for the quantum key distribution relies on the actual transmission of signal ...
C. H. Bennett   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy