Results 51 to 60 of about 1,013,153 (241)
ABSTRACT Background Neuropsychological complications may impair the qualitative prognosis of patients with pediatric brain tumors. However, multifaceted evaluations cannot be conducted in all patients because they are time consuming and burdensome for patients.
Ami Tabata +9 more
wiley +1 more source
Lightweight One-to-Many User-to-Sensors Authentication and Key Agreement
The proliferation of Internet of Things (IoT) deployments demands Authentication and Key Agreement (AKA) protocols that scale from one initiator to many devices while preserving strong security guarantees on constrained hardware. Prior lightweight one-to-
Hussein El Ghor +4 more
doaj +1 more source
Non-abelian key agreement protocols
An axiomatic description of the Diffie-Hellman key agreement protocol is presented. As examples the authors describe protocols based on known hard problems from group theory; e.g. the conjugacy problem in infinite non-Abelian groups (proven to be unsolvable in some cases).
Anshel, Iris +2 more
openaire +1 more source
Key control in key agreement protocols
Certain key establishment protocols specified in an international standard and a draft international standard are considered. These protocols are all intended to provide joint key control, i.e. the protocols are designed to prevent either party choosing the key value. It is shown that this claim is suspect for most of the protocols concerned.
Mitchell, Chris J +2 more
openaire +9 more sources
Implementing Health‐Related Quality of Life Assessment in Pediatric Oncology: A Feasibility Study
ABSTRACT Background There is growing interest in embedding health‐related quality of life (HRQoL) assessment and patient‐reported outcome measures (PROMs) within clinical cancer care. This study evaluated the feasibility, acceptability, and usability of implementing an electronic PROM (ePROM) platform to measure HRQoL in children with cancer ...
Mikaela Doig +13 more
wiley +1 more source
Attribute-based authenticated key agreement protocol supporting revocation
Revocation is a crucial issue for the practical use of attribute-based authenticated key agreement (ABAKA) protocols. A new ABAKA protocol supporting revocation was proposed.
Qiang LI, Deng-guo FENG, Li-wu ZHANG
doaj +2 more sources
Key Agreement Using Statically Keyed Authenticators [PDF]
A family of authenticators based on static shared keys is identified and proven secure. The authenticators can be used in a variety of settings, including identity-based ones. Application of the authenticators to Diffie-Hellman variants in appropriate groups leads to authenticated key agreement protocols which have attractive properties in comparison ...
Boyd, Colin +2 more
openaire +2 more sources
Treatment Decision‐Making Roles and Preferences Among Adolescents and Young Adults With Cancer
ABSTRACT Background Decision‐making (DM) dynamics between adolescents and young adults (AYAs) with cancer, parents, and oncologists remain underexplored in diverse populations. We examined cancer treatment DM preferences among an ethnically and socioeconomically diverse group of AYAs and their parents.
Amanda M. Gutierrez +14 more
wiley +1 more source
The security of mobile communication largely depends on the strength of the authentication key exchange protocol. The 3rd Generation Partnership Project (3GPP) Group has standardized the 5G AKA (Authentication and Key Agreement) protocol for the next ...
An Braeken +3 more
doaj +1 more source
ABSTRACT Background Parents of children treated for acute lymphoblastic leukemia (ALL) often experience significant caregiver burden and disruption to their well‐being. While parent quality of life (QoL) during treatment is well characterized, little is known about outcomes during early survivorship.
Sara Dal Pra +3 more
wiley +1 more source

