Results 41 to 50 of about 6,579,728 (290)
Authentication and Key Establishment in Dynamic Wireless Sensor Networks
When a sensor node roams within a very large and distributed wireless sensor network, which consists of numerous sensor nodes, its routing path and neighborhood keep changing.
Ying Qiu +3 more
doaj +1 more source
Management of Prediabetes [PDF]
Nurses have a key role in promoting the patient's self-management and fostering motivation for lifestyle change, writes Nicky ...
Kime, NH
core +1 more source
ABSTRACT Purpose Retinoblastoma (RB) is the most common pediatric ocular cancer, yet population‐based data on survival and risk factors remain limited. This study aimed to describe survival in a large national RB cohort and identify predictors of death and complications.
Samuel Sassine +14 more
wiley +1 more source
An Identity Based Key Management Scheme in Wireless Sensor Networks [PDF]
Pairwise key establishment is one of the fundamental security services in sensor networks which enables sensor nodes in a sensor network to communicate securely with each other using cryptographic techniques.
Das, Ashok Kumar, Giri, Debasis
core
ABSTRACT Objective To evaluate selumetinib exposure using therapeutic drug monitoring (TDM) in pediatric patients with neurofibromatosis type 1 (NF1) and plexiform neurofibromas (PN), assess interpatient pharmacokinetic variability, and explore the relationship between drug exposure, clinical response, and adverse effects.
Janka Kovács +8 more
wiley +1 more source
Ternary polynomial based key management scheme for wireless sensor network
A ternary polynomial based key management (KMTP) scheme was proposed,which is effective in cluster based wireless sensor networks.Firstly,the base station will give each node one unique identi ier to ensure the validity of the node.Then,algorithm of the ...
Zhi-tao GUAN, Yue XU, Jun WU
doaj
A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT Deployments
IoT systems differ from traditional Internet systems in that they are different in scale, footprint, power requirements, cost and security concerns that are often overlooked.
Soodamani Ramalingam +3 more
doaj +1 more source
Realization of smart home key management mechanism based on ECC
At present,the data encryption technology of smart home system uses symmetric encryption method,but there is a problem with key management in this way.To achieve the security of the key,the smart home system uses asymmetric encryption technology.On this ...
Wenbin CHENG, Jia LIU
doaj
With the wide use of online social networks (OSNs), the problem of data privacy has attracted a lot of attention from not only the research community but also the general public.
Guanglai Guo +4 more
doaj +1 more source
A participatory action research study of key account management changes [PDF]
Pure Participatory Action Research projects in the IMP research tradition are rather rare. This paper describes both the process and the outcomes of such a project carried out for a major business to retail firm in the UK.
Easton, G, Gilchrist, A, Lenney, P
core

