Results 51 to 60 of about 10,030,622 (339)

IPSec Key Recovery for IKEv2 [PDF]

open access: yesJournal of the Korea Academia-Industrial cooperation Society, 2010
IPSec is the security protocol that do encryption and authentication service to IP messages on network layer of the internet. This paper presents the key recovery mechanism that is applied to IKEv2 of IPSec for mobile communication environments. It results to have compatibility with IPSec and IKEv2, reduce network overhead, and perform key recovery ...
Yoon-Jung Rhee   +2 more
openaire   +1 more source

Predicting Chronicity in Children and Adolescents With Newly Diagnosed Immune Thrombocytopenia at the Timepoint of Diagnosis Using Machine Learning‐Based Approaches

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Objectives To identify predictors of chronic ITP (cITP) and to develop a model based on several machine learning (ML) methods to estimate the individual risk of chronicity at the timepoint of diagnosis. Methods We analyzed a longitudinal cohort of 944 children enrolled in the Intercontinental Cooperative immune thrombocytopenia (ITP) Study ...
Severin Kasser   +6 more
wiley   +1 more source

Study of Displacement Characteristics of Fire Flooding in Different Viscosity Heavy Oil Reservoirs

open access: yesGeofluids, 2021
A field test in the Xinjiang oilfield in China shows that the viscosity of heavy oil has a certain influence on the combustion dynamics and injection-production performance of fire flooding.
Bingyan Liu   +6 more
doaj   +1 more source

Study on Prevention of Gas Channelling of Acid-resistant Gel Foam in CO2 Flooding of Low Permeability Reservoir [PDF]

open access: yesE3S Web of Conferences, 2020
With the shortage of recoverable reserves in conventional oil reservoirs, the development of low-permeability oil reservoirs has received more and more attention.
LIU Zhaoxia   +3 more
doaj   +1 more source

Pathogenic Germline PALB2 and RAD50 Variants in Patients With Relapsed Ewing Sarcoma

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Approximately 10% of patients with Ewing sarcoma (EwS) have pathogenic germline variants. Here, we report two cases: first, a novel germline pathogenic variant in partner and localizer of BRCA2 (PALB2) in a patient with a late EwS relapse. Its impact on homologous recombination is demonstrated, and breast cancer risk is discussed.
Molly Mack   +12 more
wiley   +1 more source

On the Security of Symmetric Encryption Against Mass Surveillance

open access: yesIEEE Access, 2020
For mass surveillance, the algorithm substitution attacks (ASAs) are serious security threats to the symmetric encryption schemes. At CRYPTO 2014, Bellare, Paterson, and Rogaway (BPR) formally developed the security notions of decryptability ...
Da-Zhi Sun, Yi Mu
doaj   +1 more source

Study on the Compatibility between Combined Control of Channel Plugging and Foam Flooding and Heterogeneous Reservoirs—Taking Bohai Z Oilfield as an Example

open access: yesEnergies, 2022
With the oilfield developed to a later stage and its heterogeneity gradually becoming more serious, the adaptability of conventional profile control technologies for the reservoir becomes worse and worse.
Yunbao Zhang   +6 more
doaj   +1 more source

American Recovery and Reinvestment Act of 2009: Grant Application Information, Tips, and Thoughts [PDF]

open access: yes, 2009
This Special Report identifies some of the key elements for grants under the American Recovery and Reinvestment Act of 2009 ("Act"), offers general tips that likely will be of interest to nonprofits applying for stimulus-fund grants, and highlights some ...
Ann Beltran, Tim Delaney
core  

Understanding the Recovery Process in Psychosis [PDF]

open access: yes, 2019
Conceptualizing recovery in the context of severe and persisting mental health conditions is a complex issue. In recent years, there has been a call to re-focus research from understanding the concept of recovery to improving understanding of the process
Hampson, Margaret   +2 more
core  

CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]

open access: yes, 2017
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley   +16 more
core   +2 more sources

Home - About - Disclaimer - Privacy