Results 71 to 80 of about 4,138,516 (290)

The Measurement of Corporate IT Security Against the Internal Perspective [PDF]

open access: yes, 2018
Technology is growing the impact of this technological advances, the Information Technology world at the company is competing to perform a good performance for the company.
Andry, J. F. (Johanes)   +1 more
core  

Preferences for post‐traumatic osteoarthritis prevention strategies in individuals with anterior cruciate ligament injury

open access: yesArthritis Care &Research, Accepted Article.
Objectives There is growing interest in evaluating new strategies to delay or prevent post‐traumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury.
Kevin Kennedy   +9 more
wiley   +1 more source

The Approximate k-List Problem

open access: yesIACR Transactions on Symmetric Cryptology, 2017
We study a generalization of the k-list problem, also known as the Generalized Birthday problem. In the k-list problem, one starts with k lists of binary vectors and has to find a set of vectors – one from each list – that sum to the all-zero target ...
Leif Both, Alexander May
doaj   +1 more source

Financial Distress and Its Determinants in Rheumatoid Arthritis

open access: yesArthritis Care &Research, EarlyView.
Objective To quantify the degree of financial distress and identify its determinants in adults with rheumatoid arthritis (RA) given the frequent prolonged use of expensive disease‐modifying therapies. Methods We identified adults enrolled in the FORWARD databank with either RA or noninflammatory musculoskeletal disease (NIMSKD) completing the ...
Amber Brown Keebler   +5 more
wiley   +1 more source

Hardware Masking, Revisited

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
MaskingHardware masking schemes have shown many advances in the past few years. Through a series of publications their implementation cost has dropped significantly and flaws have been fixed where present. Despite these advancements it seems that a limit
Thomas De Cnudde   +2 more
doaj   +1 more source

Towards Enhanced Usability of IT Security Mechanisms - How to Design Usable IT Security Mechanisms Using the Example of Email Encryption

open access: yes, 2015
Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most of these mechanisms are effective, and security experts can handle them to achieve a sufficient level of security for any given system.
Hof, Hans-Joachim
core   +1 more source

Validation of the Pediatric Arthritis Ultrasound Scoring System for the Elbow, Wrist, and Finger Joints in Children With Juvenile Idiopathic Arthritis

open access: yesArthritis Care &Research, EarlyView.
Objective We aimed to validate the Pediatric Arthritis Ultrasound Scoring System (PAUSS) for upper extremity joints in children with juvenile idiopathic arthritis (JIA). Methods Children with JIA were evaluated for elbow, wrist, or finger arthritis by clinical examination (CE) and musculoskeletal ultrasound (MSUS) with images scored according to the ...
Patricia Vega‐Fernandez   +12 more
wiley   +1 more source

Social Security: What Would Happen If the Trust Funds Ran Out? [PDF]

open access: yes, 2014
[Excerpt] Each year when the Social Security trustees release their annual report, attention is focused on the projection of the year that the Social Security trust funds will become insolvent.
Meyerson, Noah P
core   +2 more sources

Association Between Symptomatic Knee Osteoarthritis and Target Glycemic Control in Individuals With Type 2 Diabetes

open access: yesArthritis Care &Research, EarlyView.
Objective Knee osteoarthritis (OA) commonly affects individuals with type 2 diabetes (T2DM) and is associated with increased risk of diabetes‐related complications. To better understand potential mechanisms, we examined the association between symptomatic knee OA and glycemic control in individuals with T2DM.
Lauren K. King   +10 more
wiley   +1 more source

Home - About - Disclaimer - Privacy