Results 311 to 320 of about 19,485,349 (343)
Some of the next articles are maybe not open access.
Nursing Management, 2009
This one-day conference includes sessions on an array of nursing topics to ensure patient safety. These include nursing management and leadership, continuous assessment, training, nursing indicators and metrics. Falls management, failure to rescue and pressure ulcer management are also examined.
openaire +2 more sources
This one-day conference includes sessions on an array of nursing topics to ensure patient safety. These include nursing management and leadership, continuous assessment, training, nursing indicators and metrics. Falls management, failure to rescue and pressure ulcer management are also examined.
openaire +2 more sources
The American Journal of Bioethics, 2019
Kious and Battin convincingly argue that if physician assisted death (PAD) is allowed for somatic suffering, it should also be allowed for some psychiatric patients (Kious and Battin 2019).
van Veen, SMP, van Delden, Johannes
openaire +5 more sources
Kious and Battin convincingly argue that if physician assisted death (PAD) is allowed for somatic suffering, it should also be allowed for some psychiatric patients (Kious and Battin 2019).
van Veen, SMP, van Delden, Johannes
openaire +5 more sources
Algorithmica, 2002
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +2 more sources
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +2 more sources
IEEE Security & Privacy, 2015
Whenever someone says that something is encrypted, the first question you should ask is, "What about the keys?" Protecting encryption keys requires protecting the entire system.
openaire +1 more source
Whenever someone says that something is encrypted, the first question you should ask is, "What about the keys?" Protecting encryption keys requires protecting the entire system.
openaire +1 more source
1999
Public-key algorithms use a secret element and a public element to their code. One of the main algorithms is RSA. Compared with DES it is relatively slow but it has the advantage that users can choose their own key whenever they need one. The most commonly used public-key cryptosystems are covered in the next sections.
openaire +1 more source
Public-key algorithms use a secret element and a public element to their code. One of the main algorithms is RSA. Compared with DES it is relatively slow but it has the advantage that users can choose their own key whenever they need one. The most commonly used public-key cryptosystems are covered in the next sections.
openaire +1 more source

