Results 61 to 70 of about 6,579,728 (290)
Outcomes of Live Virus Vaccination in Patients With Vascular Anomalies Being Treated With Sirolimus
ABSTRACT Background Live vaccination in patients with vascular anomalies (VA) receiving sirolimus remains controversial due to immunosuppressive effects and theoretical risks. Procedure This single‐center retrospective study included patients with VA less than 4 years old at the start of sirolimus therapy who were incompletely vaccinated.
Svatava Merkle +5 more
wiley +1 more source
Survey of wireless sensor network security techniques
The current situations of sensor network security,the security challenges and the security problems were pre-sented.From the aspects of key management,secure routing,authentication,intrusion detection,DoS attack,access con-trol,all the security ...
PEI Qing-qi1 +2 more
doaj
Key Pre-Distributions From Graph-Based Block Designs
With the development of wireless communication technologies which considerably contributed to the development of wireless sensor networks (WSN), we have witnessed an ever-increasing WSN based applications which induced a host of research activities in ...
Bouabdallah, Abdelmadjid +2 more
core +3 more sources
ABSTRACT Background Nurses are central to cancer care for children and adolescents, yet no comprehensive synthesis has defined essential core competencies for pediatric oncology nursing (PON) practice internationally, particularly in Latin America and the Caribbean (LAC).
Luís Carlos Lopes‐Júnior +7 more
wiley +1 more source
Research on large-scale identity authentication architecture based on combined symmetric key
A large-scale real-name authentication architecture and key management protocol based on combined symmet-ric key algorithm were proposed.With the CSK algorithm and smart card technology, the authentication process can be finished in the chips, and the ...
LIU Tong, XU Guan-ning
doaj
Key Management Systems at the Cloud Scale
This paper describes a cloud-scale encryption system. It discusses the constraints that shaped the design of Amazon Web Services’ Key Management Service, and in particular, the challenges that arise from using a standard mode of operation such as ...
Matthew Campagna, Shay Gueron
doaj +1 more source
The Key to Risk Management: Management [PDF]
The Barings, Daiwa Bank and Sumitomo Corp. financial debacles in the mid-1990s suggest that management failures rather than misfortune, errors, or complexity are a major source of the risk of financial debacles.
Adrian E. Tschoegl
core
Entrepreneurial marketing : a historical perspective on development and practice [PDF]
Entrepreneurial marketing is a term which is receiving increasing use. It essentially encompasses two very distinct areas of management: marketing and entrepreneurship.
Collinson, E.M., Shaw, E.
core +1 more source
Prevalence and Trajectory of Household Material Hardship Among Children With Advanced Cancer
ABSTRACT Background/Objectives Families of children with advanced cancer living in poverty experience inferior outcomes including poor parent mental health and worse child quality of life. Household material hardship (HMH: food, housing, transportation, and/or utility insecurity) is a modifiable poverty exposure—and potential intervention target—that ...
Sarah Wright +13 more
wiley +1 more source
Domain-based key management for heterogeneous wireless sensor networks
Key management was one of the most challenging security problems in wireless sensor networks. Based on the random key pre-distribution scheme, a new scheme was proposed for heterogeneous wireless sensor networks using deployment knowledge of the node and
MA Chun-guang +2 more
doaj

