Results 91 to 100 of about 6,579,728 (290)

Authentication and Delegation for Operating a Multi-Drone System

open access: yesSensors, 2019
As the era of IoT comes, drones are in the spotlight as a mobile medium of Internet of Things (IoT) devices and services. However, drones appear to be vulnerable to physical capture attacks since they usually operate far from operators.
Mungyu Bae, Hwangnam Kim
doaj   +1 more source

The Engineering of a Scalable Multi-Site Communications System Utilizing Quantum Key Distribution (QKD)

open access: yes, 2017
Quantum Key Distribution (QKD) is a means of generating keys between a pair of computing hosts that is theoretically secure against cryptanalysis, even by a quantum computer. Although there is much active research into improving the QKD technology itself,
Ling, Xinhua   +3 more
core   +1 more source

The Role of Invasive Procedures in the Treatment of Complicated Gastrointestinal Graft‐Versus‐Host Disease in Pediatric Patients

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Gastrointestinal graft‐versus‐host disease (GI GVHD) following hematopoietic stem cell transplant is typically managed with medical therapy, but surgery and angioembolization may be warranted in selected cases with life‐threatening complications.
Gaia Brunetti   +12 more
wiley   +1 more source

A Hybrid DOS-Tolerant PKC-Based Key Management System for WSNs

open access: yesInternational Journal of Information and Communication Technology Research, 2018
Security is a critical and vital task in wireless sensor networks (WSNs), therefore different key management systems have been proposed, many of which are based on symmetric primitives.
Hamzeh Ghasemzadeh   +2 more
doaj  

Butterfly Encryption Scheme for Resource-Constrained Wireless Networks

open access: yesSensors, 2015
Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed.
Raghav V. Sampangi, Srinivas Sampalli
doaj   +1 more source

Two Faces of NOTCH1 in Childhood Lymphoblastic T‐Cell Neoplasia: Prognostic Divergence of Mutational and Structural Aberrations

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT In pediatric patients, T‐cell lymphoblastic lymphoma (T‐LBL) survival exceeds 80%. Relapse remains associated with limited curative options. Frontline treatment is largely extrapolated from T‐cell acute lymphoblastic leukemia (T‐ALL) treatment, reflecting the ongoing debate, whether both entities represent distinct diseases or variants within ...
Marie C. Heider   +4 more
wiley   +1 more source

Attack Algorithm for a Keystore-Based Secret Key Generation Method

open access: yesEntropy, 2019
A new attack algorithm is proposed for a secure key generation and management method introduced by Yang and Wu. It was previously claimed that the key generation method of Yang and Wu using a keystore seed was information-theoretically secure and could ...
Seungjae Chae   +3 more
doaj   +1 more source

Efficacy and Safety Analysis of Roxarestat in Regulating Renal Anemia in Patients on Maintenance Hemodialysis

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Objective To compare the efficacy and safety of roxarestat versus recombinant human erythropoietin (rhEPO) in the management of renal anemia in patients undergoing maintenance hemodialysis. Methods This was a prospective, open‐label, randomized controlled trial.
Lingling Chen, Junjie Zhu, Qiaonan Ge
wiley   +1 more source

Home - About - Disclaimer - Privacy