Results 61 to 70 of about 6,579,728 (290)

Outcomes of Live Virus Vaccination in Patients With Vascular Anomalies Being Treated With Sirolimus

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Live vaccination in patients with vascular anomalies (VA) receiving sirolimus remains controversial due to immunosuppressive effects and theoretical risks. Procedure This single‐center retrospective study included patients with VA less than 4 years old at the start of sirolimus therapy who were incompletely vaccinated.
Svatava Merkle   +5 more
wiley   +1 more source

Survey of wireless sensor network security techniques

open access: yesTongxin xuebao, 2007
The current situations of sensor network security,the security challenges and the security problems were pre-sented.From the aspects of key management,secure routing,authentication,intrusion detection,DoS attack,access con-trol,all the security ...
PEI Qing-qi1   +2 more
doaj  

Key Pre-Distributions From Graph-Based Block Designs

open access: yes, 2015
With the development of wireless communication technologies which considerably contributed to the development of wireless sensor networks (WSN), we have witnessed an ever-increasing WSN based applications which induced a host of research activities in ...
Bouabdallah, Abdelmadjid   +2 more
core   +3 more sources

Pediatric Oncology Nursing Competencies in Latin America and the Caribbean: A Scoping Review to Inform Practice, Education, and Research

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Nurses are central to cancer care for children and adolescents, yet no comprehensive synthesis has defined essential core competencies for pediatric oncology nursing (PON) practice internationally, particularly in Latin America and the Caribbean (LAC).
Luís Carlos Lopes‐Júnior   +7 more
wiley   +1 more source

Research on large-scale identity authentication architecture based on combined symmetric key

open access: yesTongxin xuebao, 2009
A large-scale real-name authentication architecture and key management protocol based on combined symmet-ric key algorithm were proposed.With the CSK algorithm and smart card technology, the authentication process can be finished in the chips, and the ...
LIU Tong, XU Guan-ning
doaj  

Key Management Systems at the Cloud Scale

open access: yesCryptography, 2019
This paper describes a cloud-scale encryption system. It discusses the constraints that shaped the design of Amazon Web Services’ Key Management Service, and in particular, the challenges that arise from using a standard mode of operation such as ...
Matthew Campagna, Shay Gueron
doaj   +1 more source

The Key to Risk Management: Management [PDF]

open access: yes
The Barings, Daiwa Bank and Sumitomo Corp. financial debacles in the mid-1990s suggest that management failures rather than misfortune, errors, or complexity are a major source of the risk of financial debacles.
Adrian E. Tschoegl
core  

Entrepreneurial marketing : a historical perspective on development and practice [PDF]

open access: yes, 2001
Entrepreneurial marketing is a term which is receiving increasing use. It essentially encompasses two very distinct areas of management: marketing and entrepreneurship.
Collinson, E.M., Shaw, E.
core   +1 more source

Prevalence and Trajectory of Household Material Hardship Among Children With Advanced Cancer

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background/Objectives Families of children with advanced cancer living in poverty experience inferior outcomes including poor parent mental health and worse child quality of life. Household material hardship (HMH: food, housing, transportation, and/or utility insecurity) is a modifiable poverty exposure—and potential intervention target—that ...
Sarah Wright   +13 more
wiley   +1 more source

Domain-based key management for heterogeneous wireless sensor networks

open access: yesTongxin xuebao, 2009
Key management was one of the most challenging security problems in wireless sensor networks. Based on the random key pre-distribution scheme, a new scheme was proposed for heterogeneous wireless sensor networks using deployment knowledge of the node and
MA Chun-guang   +2 more
doaj  

Home - About - Disclaimer - Privacy