Results 21 to 30 of about 1,614,631 (234)

Secure Communication in Drone Networks: A Comprehensive Survey of Lightweight Encryption and Key Management Techniques

open access: yesDrones
Deployment of Unmanned Aerial Vehicles (UAVs) continues to expand rapidly across a wide range of applications, including environmental monitoring, precision agriculture, and disaster response.
Sayani Sarkar   +3 more
doaj   +1 more source

Stressful Events Reported by Childhood Cancer Survivors and Community Controls From the St. Jude Lifetime (SJLIFE) Cohort: A Mixed Method Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction Characterizing stressful events reported by childhood cancer survivors experienced throughout the lifespan may help improve trauma‐informed care relevant to the survivor experience. Methods Participants included 2552 survivors (54% female; 34 years of age) and 469 community controls (62% female; 33 years of age) from the St.
Megan E. Ware   +13 more
wiley   +1 more source

Transitory Master Key Transport Layer Security for WSNs

open access: yesIEEE Access, 2020
Security approaches in Wireless Sensor Networks (WSNs) are normally based on symmetric cryptography. Instead of symmetric encryption, some alternative approaches have been developed by using public-key cryptography. However, the higher computational cost
Mattia Griotti   +2 more
doaj   +1 more source

Utility of Computed Tomography Surveillance of Asymptomatic Infection in Children and Young Adults Before Allogeneic Hematopoietic Stem Cell Transplant

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Asymptomatic infection poses a significant risk for children undergoing hematopoietic stem cell transplantation (HSCT). Pre‐transplant surveillance computed tomography (CT) is commonly used to identify occult infection, though its diagnostic yield remains uncertain.
Tyler Obermark   +9 more
wiley   +1 more source

A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the Internet of Things

open access: yesIEEE Access, 2019
The Internet of Things envisages connecting all physical objects or things to the Internet, using devices as diverse as smartphones, coffee makers, washing machines, automobiles, lamps, and wearable devices, among many others.
Manisha Malik   +2 more
doaj   +1 more source

Unheard and Under‐Supported: Health‐Related Quality of Life in Children, Adolescents, and Young Adults With Sickle Cell Disease

open access: yesPediatric Blood &Cancer, EarlyView.
Abstract Background Sickle cell disease (SCD) is an autosomal recessive hemoglobinopathy affecting millions of individuals worldwide. The clinical expression and psychosocial burden of SCD vary widely across geographical, cultural, and healthcare system contexts, underscoring the need for setting‐specific approaches to assessment.
Desiré Fantasia   +7 more
wiley   +1 more source

Imaging of High‐Risk Neuroblastoma: Recommendations From SIOPEN Radiology and Nuclear Medicine Specialty Committees

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Neuroblastoma is the most common extracranial solid tumor in early childhood. Its clinical behavior is highly variable, ranging from spontaneous regression to fatal outcome despite intensive treatment. The International Society of Pediatric Oncology Europe Neuroblastoma Group (SIOPEN) Radiology and Nuclear Medicine Specialty Committees ...
Annemieke Littooij   +11 more
wiley   +1 more source

An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge

open access: yesSensors, 2008
For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving.
Le Xuan Hung   +4 more
doaj   +1 more source

Exploring Preferences for a Digital Single‐Session Intervention for Adolescent Siblings of Youth With Cancer

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction Adolescent siblings of children with cancer are at elevated risk for psychosocial problems. Unfortunately, various barriers such as limited family time and resources, conflicting schedules, and psychosocial staffing constraints at cancer centers hinder sibling access to support.
Christina M. Amaro   +10 more
wiley   +1 more source

Authentication and Key Establishment in Dynamic Wireless Sensor Networks

open access: yesSensors, 2010
When a sensor node roams within a very large and distributed wireless sensor network, which consists of numerous sensor nodes, its routing path and neighborhood keep changing.
Ying Qiu   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy