Results 41 to 50 of about 179,893 (274)

Preferences of Pediatric Patients and Their Caregivers for Chemotherapy‐Induced Nausea and Vomiting Control Endpoints: A Mixed Methods Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Although not always achieved, complete chemotherapy‐induced nausea and vomiting (CINV) control is the conventional goal of CINV prophylaxis. In this two‐center, mixed‐methods study, we sought to understand the preferences of adolescent patients and family caregivers for CINV control endpoints.
Haley Newman   +8 more
wiley   +1 more source

Free-Space Quantum Key Distribution

open access: yes, 2016
Based on the firm laws of physics rather than unproven foundations of mathematical complexity, quantum cryptography provides a radically different solution for encryption and promises unconditional security.
Carrasco-Casado, Alberto   +2 more
core   +1 more source

Underwater Hacker Missile Wars: A Cryptography and Engineering Contest [PDF]

open access: yes, 2005
For a recent student conference, the authors developed a day-long design problem and competition suitable for engineering, mathematics and science undergraduates.
Holden, Joshua   +3 more
core   +1 more source

Inpatient Food Insecurity and Pediatric Hematology Oncology Hospitalization Outcomes

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Children with cancer and blood disorders are at risk for food insecurity (FI). We aimed to describe the association of inpatient food insecurity (IFI) and hospitalization outcomes among patients admitted to the pediatric hematology oncology service. Of 325 caregivers screened for IFI, 60 (18.6%) screened positive.
Joanna M. Robles   +4 more
wiley   +1 more source

Cryptanalysis of a one round chaos-based Substitution Permutation Network

open access: yes, 2012
The interleaving of chaos and cryptography has been the aim of a large set of works since the beginning of the nineties. Many encryption proposals have been introduced to improve conventional cryptography. However, many proposals possess serious problems
Arroyo, David   +2 more
core   +1 more source

Asymmetric Cryptography

open access: yesIrish Mathematical Society Bulletin, 1988
This short survey article reviews progress in asymmetric (or public-key) cryptography. Knapsack methods are described along with the successful attacks by Shamir and others. The RSA method and certain generalisations are also considered.
openaire   +2 more sources

‘They Need to Hear You Say It’: Healthcare Professionals’ Perspectives on Barriers and Enablers to End‐of‐Life Discussions With Adolescents and Young Adults With Cancer

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT End‐of‐life conversations with adolescents and young adults (AYAs) with cancer rarely occur without the guidance of healthcare professionals. As a part of the ‘Difficult Discussions’ study, focused on palliative care and advance care planning discussions with AYAs with cancer, we investigated the factors that healthcare professionals identify ...
Justine Lee   +9 more
wiley   +1 more source

Efficient High-Order Masking of FrodoKEM’s CDT-Based Gaussian Sampler

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
FrodoKEM is a conservative lattice-based KEM based on the Learning With Errors problem. While it was not selected for NIST standardization, it remains a strong candidate for high-security applications and is recommended by several national agencies ...
Elie Eid   +3 more
doaj   +1 more source

Defining Roles in Pediatric Palliative Care: Perspectives From Oncology and Palliative Care Teams

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Early integration of pediatric palliative care (PPC) is associated with improved symptom management, quality of life, and healthcare utilization for children with cancer. Despite this, variation persists in how PPC is understood, operationalized, and integrated within pediatric oncology programs. In particular, ambiguity surrounding
Leeat Granek   +13 more
wiley   +1 more source

An enhanced state-aware model learning approach for security analysis in lightweight protocol implementations

open access: yesJournal of Cloud Computing: Advances, Systems and Applications
Owing to the emergence and rapid advances of new-generation information and digitalization technologies, the concept of model-driven digital twin has received widespread attentions and is developing vigorously.
Jiaxing Guo   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy