Results 71 to 80 of about 1,010 (133)

MergeMAC:A MAC for Authentication with Strict Time Constraints and Limited Bandwidth [PDF]

open access: yes, 2018
This paper presents MergeMAC, a MAC that is particularly suitable for environments with strict time requirements and extremely limited bandwidth. MergeMAC computes the MAC by splitting the message into two parts.
Ankele, Ralph   +2 more
core   +2 more sources

Evaluation of the nitrosamine impurities of ACE inhibitors using computational, in vitro, and in vivo methods demonstrate no genotoxic potential

open access: yesEnvironmental and Molecular Mutagenesis, Volume 65, Issue 6-7, Page 203-221, July‐August 2024.
Abstract Evaluation and mitigation of the potential carcinogenic risks associated with nitrosamines in marketed pharmaceutical products are areas of interest for pharmaceutical companies and health authorities alike. Significant progress has been made to establish acceptable intake (AI) levels for N‐nitrosamine drug substance‐related impurities (NDSRIs)
Jennifer Cheung   +7 more
wiley   +1 more source

Population pharmacokinetic modeling of oral brepocitinib in healthy volunteers and patients with immuno‐inflammatory diseases

open access: yesCPT: Pharmacometrics &Systems Pharmacology, Volume 13, Issue 4, Page 551-562, April 2024.
Abstract The objective of this population pharmacokinetic (PK) analysis was to characterize the concentration–time profile of brepocitinib plasma concentration after single‐ and multiple‐oral administration in healthy volunteers (HVs) and patients with immuno‐inflammatory diseases. Blood samples from phase I HV and phase II clinical studies of patients
Farzaneh Maleki   +4 more
wiley   +1 more source

Casimir effect for tachyonic fields

open access: yes, 2003
In this paper we examine Casimir effect in the case of tachyonic field, which is connected with particles with negative four-momentum square. We consider here only the case of one dimensional, scalar field.
A. A. Grib   +17 more
core   +1 more source

The related-key analysis of feistel constructions [PDF]

open access: yes, 2014
Lecture Notes in Computer Science, Volume 8540, 2015.It is well known that the classical three- and four-round Feistel constructions are provably secure under chosen-plaintext and chosen-ciphertext attacks, respectively.
A Biryukov   +34 more
core   +1 more source

Evaluation of the health‐related quality of life in dogs following intracranial meningioma resection using a specifically developed questionnaire

open access: yesVeterinary and Comparative Oncology, Volume 22, Issue 1, Page 89-95, March 2024.
Abstract As advanced treatments are becoming increasingly feasible in veterinary medicine, the evaluation of the health‐related quality of life (HRQOL) of treated animals is becoming more relevant. We evaluated owner‐perceived HRQOL of 10 dogs that underwent craniotomy for meningioma resection between 2002 and 2022 at our institution through telephone ...
Chiara Köcher   +2 more
wiley   +1 more source

How to detect a possible correlation from the information of a sub-system in quantum mechanical systems

open access: yes, 2007
A possibility to detect correlations between two quantum mechanical systems only from the information of a subsystem is investigated. For generic cases, we prove that there exist correlations between two quantum systems if the time-derivative of the ...
B. d’Espagnat   +16 more
core   +1 more source

Cheon's anholonomies in Floquet operators

open access: yes, 2007
Anholonomies in the parametric dependences of the eigenvalues and the eigenvectors of Floquet operators that describe unit time evolutions of periodically driven systems, e.g., kicked rotors, are studied.
A. Bohm   +9 more
core   +1 more source

Machine-checked proofs for cryptographic standards indifferentiability of SPONGE and secure high-assurance implementations of SHA-3 [PDF]

open access: yes, 2019
We present a high-assurance and high-speed implementation of the SHA-3 hash function. Our implementation is written in the Jasmin programming language, and is formally verified for functional correctness, provable security and timing attack resistance in
Almeida José Bacelar   +19 more
core   +8 more sources

Charge transport in nanochannels: a molecular theory

open access: yes, 2012
We introduce a theoretical and numerical method to investigate the flow of charged fluid mixtures under extreme confinement. We model the electrolyte solution as a ternary mixture, comprising two ionic species of opposite charge and a third uncharged ...
Marconi, Umberto Marini Bettolo   +1 more
core   +1 more source

Home - About - Disclaimer - Privacy