Results 51 to 60 of about 10,030,622 (339)
IPSec Key Recovery for IKEv2 [PDF]
IPSec is the security protocol that do encryption and authentication service to IP messages on network layer of the internet. This paper presents the key recovery mechanism that is applied to IKEv2 of IPSec for mobile communication environments. It results to have compatibility with IPSec and IKEv2, reduce network overhead, and perform key recovery ...
Yoon-Jung Rhee +2 more
openaire +1 more source
ABSTRACT Objectives To identify predictors of chronic ITP (cITP) and to develop a model based on several machine learning (ML) methods to estimate the individual risk of chronicity at the timepoint of diagnosis. Methods We analyzed a longitudinal cohort of 944 children enrolled in the Intercontinental Cooperative immune thrombocytopenia (ITP) Study ...
Severin Kasser +6 more
wiley +1 more source
Study of Displacement Characteristics of Fire Flooding in Different Viscosity Heavy Oil Reservoirs
A field test in the Xinjiang oilfield in China shows that the viscosity of heavy oil has a certain influence on the combustion dynamics and injection-production performance of fire flooding.
Bingyan Liu +6 more
doaj +1 more source
Study on Prevention of Gas Channelling of Acid-resistant Gel Foam in CO2 Flooding of Low Permeability Reservoir [PDF]
With the shortage of recoverable reserves in conventional oil reservoirs, the development of low-permeability oil reservoirs has received more and more attention.
LIU Zhaoxia +3 more
doaj +1 more source
Pathogenic Germline PALB2 and RAD50 Variants in Patients With Relapsed Ewing Sarcoma
ABSTRACT Approximately 10% of patients with Ewing sarcoma (EwS) have pathogenic germline variants. Here, we report two cases: first, a novel germline pathogenic variant in partner and localizer of BRCA2 (PALB2) in a patient with a late EwS relapse. Its impact on homologous recombination is demonstrated, and breast cancer risk is discussed.
Molly Mack +12 more
wiley +1 more source
On the Security of Symmetric Encryption Against Mass Surveillance
For mass surveillance, the algorithm substitution attacks (ASAs) are serious security threats to the symmetric encryption schemes. At CRYPTO 2014, Bellare, Paterson, and Rogaway (BPR) formally developed the security notions of decryptability ...
Da-Zhi Sun, Yi Mu
doaj +1 more source
With the oilfield developed to a later stage and its heterogeneity gradually becoming more serious, the adaptability of conventional profile control technologies for the reservoir becomes worse and worse.
Yunbao Zhang +6 more
doaj +1 more source
American Recovery and Reinvestment Act of 2009: Grant Application Information, Tips, and Thoughts [PDF]
This Special Report identifies some of the key elements for grants under the American Recovery and Reinvestment Act of 2009 ("Act"), offers general tips that likely will be of interest to nonprofits applying for stimulus-fund grants, and highlights some ...
Ann Beltran, Tim Delaney
core
Understanding the Recovery Process in Psychosis [PDF]
Conceptualizing recovery in the context of severe and persisting mental health conditions is a complex issue. In recent years, there has been a call to re-focus research from understanding the concept of recovery to improving understanding of the process
Hampson, Margaret +2 more
core
CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley +16 more
core +2 more sources

