Results 41 to 50 of about 6,579,728 (290)

Authentication and Key Establishment in Dynamic Wireless Sensor Networks

open access: yesSensors, 2010
When a sensor node roams within a very large and distributed wireless sensor network, which consists of numerous sensor nodes, its routing path and neighborhood keep changing.
Ying Qiu   +3 more
doaj   +1 more source

Management of Prediabetes [PDF]

open access: yes, 2013
Nurses have a key role in promoting the patient's self-management and fostering motivation for lifestyle change, writes Nicky ...
Kime, NH
core   +1 more source

Survival Outcomes and Complications Among Canadian Children With Retinoblastoma: A Population‐Based Report From CYP‐C

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Retinoblastoma (RB) is the most common pediatric ocular cancer, yet population‐based data on survival and risk factors remain limited. This study aimed to describe survival in a large national RB cohort and identify predictors of death and complications.
Samuel Sassine   +14 more
wiley   +1 more source

An Identity Based Key Management Scheme in Wireless Sensor Networks [PDF]

open access: yes, 2011
Pairwise key establishment is one of the fundamental security services in sensor networks which enables sensor nodes in a sensor network to communicate securely with each other using cryptographic techniques.
Das, Ashok Kumar, Giri, Debasis
core  

Personalized Selumetinib Dosing in Pediatric Neurofibromatosis Type 1: Insights From a Pilot Therapeutic Drug Monitoring Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Objective To evaluate selumetinib exposure using therapeutic drug monitoring (TDM) in pediatric patients with neurofibromatosis type 1 (NF1) and plexiform neurofibromas (PN), assess interpatient pharmacokinetic variability, and explore the relationship between drug exposure, clinical response, and adverse effects.
Janka Kovács   +8 more
wiley   +1 more source

Ternary polynomial based key management scheme for wireless sensor network

open access: yesTongxin xuebao, 2013
A ternary polynomial based key management (KMTP) scheme was proposed,which is effective in cluster based wireless sensor networks.Firstly,the base station will give each node one unique identi ier to ensure the validity of the node.Then,algorithm of the ...
Zhi-tao GUAN, Yue XU, Jun WU
doaj  

A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT Deployments

open access: yesSensors, 2020
IoT systems differ from traditional Internet systems in that they are different in scale, footprint, power requirements, cost and security concerns that are often overlooked.
Soodamani Ramalingam   +3 more
doaj   +1 more source

Realization of smart home key management mechanism based on ECC

open access: yesDianxin kexue, 2017
At present,the data encryption technology of smart home system uses symmetric encryption method,but there is a problem with key management in this way.To achieve the security of the key,the smart home system uses asymmetric encryption technology.On this ...
Wenbin CHENG, Jia LIU
doaj  

A Privacy-Preserving Framework With Self-Governance and Permission Delegation in Online Social Networks

open access: yesIEEE Access, 2020
With the wide use of online social networks (OSNs), the problem of data privacy has attracted a lot of attention from not only the research community but also the general public.
Guanglai Guo   +4 more
doaj   +1 more source

A participatory action research study of key account management changes [PDF]

open access: yes, 2006
Pure Participatory Action Research projects in the IMP research tradition are rather rare. This paper describes both the process and the outcomes of such a project carried out for a major business to retail firm in the UK.
Easton, G, Gilchrist, A, Lenney, P
core  

Home - About - Disclaimer - Privacy