Results 41 to 50 of about 3,264,256 (293)

Digital Signature Security in Data Communication

open access: yes, 2018
Authenticity of access in very information are very important in the current era of Internet-based technology, there are many ways to secure information from irresponsible parties with various security attacks, some of technique can use for defend attack
Abdillah, Leon Andretti   +8 more
core   +1 more source

Clinical and Biological Features of Response in Resistant Neuroblastoma to 131I‐Metaiodobenzylguanidine Radiotherapy in the Anti‐GD2 Immunotherapy Era

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background 131I‐metaiodobenzylguanidine (131I‐MIBG) radiotherapy is a key treatment for relapsed and refractory (R/R) neuroblastoma (NB). Patients with R/R disease treated in the modern era are increasingly exposed to anti‐GD2 immunotherapy, which exerts selective pressure and may modify both tumor cell state and microenvironment.
Benjamin J. Lerman   +7 more
wiley   +1 more source

Computing on Masked Data to improve the Security of Big Data

open access: yes, 2015
Organizations that make use of large quantities of information require the ability to store and process data from central locations so that the product can be shared or distributed across a heterogeneous group of users.
Gadepally, Vijay   +6 more
core   +1 more source

Assessing Cognitive Functioning in Children With Brain Tumors: Interaction of Neighborhood Social Determinants of Health and Neurological Risk

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background This study investigated how neighborhood‐level social determinants of health (SDOH), including redlining and neurological risk, interact to influence cognitive outcomes in children treated for brain tumors (CTBT). Methods A retrospective chart review of 161 CTBT aged 5–17 was conducted.
Alannah R. Srsich   +5 more
wiley   +1 more source

FL-GUARD: A Holistic Framework for Run-Time Detection and Recovery of Negative Federated Learning

open access: yesData Science and Engineering
Federated learning (FL) is a promising approach for learning a model from data distributed on massive clients without exposing data privacy. It works effectively in the ideal federation where clients share homogeneous data distribution and learning ...
Hong Lin   +4 more
doaj   +1 more source

Some Potential Issues with the Security of HTML5 IndexedDB [PDF]

open access: yes, 2014
The new HTML5 standard provides much more access to client resources, such as user location and local data storage. Unfortunately, this greater access may create new security risks that potentially can yield new threats to user privacy and web attacks ...
Ellman, Jeremy   +2 more
core   +1 more source

Supporting Survivor‐Centered Care Through Digital Health Integration

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Survivors of childhood cancer face barriers to receiving guideline‐based, long‐term follow‐up care. Two digital tools, Passport for Care (PFC) and Cancer SurvivorLink (SurvivorLink), address complementary gaps by enabling tailored survivorship care plan (SCP) generation, updating, storage, and sharing.
Jordan G. Marchak   +15 more
wiley   +1 more source

Homomorphic encryption location privacy-preserving scheme based on Markov model

open access: yes网络与信息安全学报, 2017
Homomorphic encryption location privacy-preserving scheme based on Markov mode was proposed to solve the problem of location privacy and query privacy protection in location-based service systems.
Kai ZHOU,Jian-qiong HE   +2 more
doaj   +1 more source

Therapeutic Apheresis for Intravenous Methylprednisolone‐Refractory Neuromyelitis Optica Spectrum Disorder: Clinical and Radiological Outcomes in a Single‐Center Case Series

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Background Neuromyelitis optica spectrum disorder (NMOSD) is a relapsing autoimmune disease of the central nervous system. High‐dose intravenous methylprednisolone (IVMP) is the standard first‐line therapy for acute attacks, although some patients remain refractory.
Wataru Horiguchi   +5 more
wiley   +1 more source

Analysis and Improvement of Entropy Estimators in NIST SP 800-90B for Non-IID Entropy Sources

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Random number generators (RNGs) are essential for cryptographic applications. In most practical applications, the randomness of RNGs is provided by entropy sources.
Shuangyi Zhu   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy