Results 81 to 90 of about 1,662,639 (284)

Security of practical modulator-free quantum key distribution

open access: yesnpj Quantum Information
Recent advancements in quantum key distribution have led to the development of various modulator-free transmitters. Among their advantages, they offer enhanced security against Trojan-horse attacks. However, practical implementations emit residual pulses
Álvaro Navarrete   +2 more
doaj   +1 more source

Associations of Rheumatoid Arthritis Disease Activity with Frailty Over Five Years of Follow‐up

open access: yesArthritis Care &Research, Accepted Article.
Objective To evaluate whether rheumatoid arthritis (RA) disease activity is associated with frailty both in cross‐section and longitudinally. Methods Participants within the Veterans Affairs Rheumatoid Arthritis registry enrolled from 2003 to 2022 were included. The exposure was RA disease activity measured by Disease Activity Score in 28‐joints (DAS28)
Courtney N. Loecker   +14 more
wiley   +1 more source

Real‐world trends in prenatal antirheumatic drug utilization in Ontario, Canada: A cross‐sectional time‐series analysis

open access: yesArthritis Care &Research, Accepted Article.
Objectives This study aimed to describe real‐world trends in preconception and prenatal use of antirheumatic drugs among pregnant individuals with rheumatic diseases in Ontario, Canada. Methods We conducted a time‐series analysis using repeated cross‐sectional data to examine annual patterns of disease‐modifying antirheumatic drug (DMARD) use among ...
Shenthuraan Tharmarajah   +6 more
wiley   +1 more source

Packaging of Macroscopic Material Payloads: Needs, Challenges, Concepts, and Future Directions

open access: yesAdvanced Engineering Materials, EarlyView.
This review introduces a unified framework that decomposes any macroscopic packaging system into the payload, packaging material, and packaging strategy and combines them into a conceptual packaging equation: packaging strategy = payload + packaging material.
Venkata S. R. Jampani, Manos Anyfantakis
wiley   +1 more source

A Container-based Trusted Multi-level Security Mechanism

open access: yesITM Web of Conferences, 2017
Multi-level security mechanism has been widely applied in the military, government, defense and other domains in which information is required to be divided by security-level.
Li Xiao-Yong, Ji Chen, Liu Gang
doaj   +1 more source

Security of signed ELGamal encryption [PDF]

open access: yes, 2005
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against the adaptive chosen ciphertext attack, in which an attacker can freely use
Jakobsson, Markus, Schnorr, Claus Peter
core  

Thermodynamic Pathways of Nonequilibrium Solidification in Wire‐Arc Additive Manufacturing Fe‐Based Multicomponent Alloy Structures

open access: yesAdvanced Engineering Materials, EarlyView.
Geometry‐driven thermal behavior in wire‐arc additive manufacturing (WAAM) influences microstructural evolution during nonequilibrium solidification of a chemically complex Fe–Cr–Nb–W–Mo–C nanocomposite system. By comparing different deposits configurations, distinct entropy–cooling rate correlations, segregation, and carbide evolution are revealed ...
Blanca Palacios   +5 more
wiley   +1 more source

Value-driven Security Agreements in Extended Enterprises [PDF]

open access: yes, 2010
Today organizations are highly interconnected in business networks called extended enterprises. This is mostly facilitated by outsourcing and by new economic models based on pay-as-you-go billing; all supported by IT-as-a-service.
Franqueira, Virginia Nunes Leal   +1 more
core   +2 more sources

Influence of an Oxygen‐Free Atmosphere on Diamond‐Single‐Grain Scratching of Ti–6Al–4V

open access: yesAdvanced Engineering Materials, EarlyView.
Single‐grain scratching of Ti–6Al–4V is investigated under controlled, oxygen‐free, and ambient atmospheres using a novel experimental setup with in situ high‐speed imaging. The approach enables direct observation of chip formation and adhesion under suppressed oxidation.
Berend Denkena   +2 more
wiley   +1 more source

Youth Counter-Radicalization Program: A Practical Application of Domestic Security

open access: yesThe Journal of Intelligence, Conflict and Warfare
On September 18th, 2025, Ms. Lila Green presented Youth Counter-Radicalization Program: A Practical Application of Domestic Security. The presentation was followed by a question-and-answer period with questions from the audience and CASIS ...
Lila Green
doaj   +1 more source

Home - About - Disclaimer - Privacy