Results 51 to 60 of about 3,071,363 (328)

Association of the ICH Score With Withdrawal of Life‐Sustaining Treatment Over a 10‐Year Period

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective The intracerebral hemorrhage (ICH) score was developed to enhance provider communication and facilitate early severity assessment. We examined the association of the ICH score with mortality and withdrawal of life‐sustaining treatment (WLST) in a large, multicenter stroke registry, and evaluated temporal trends in these associations.
Nina Massad   +15 more
wiley   +1 more source

Design and parallel implementation on Artix-7 FPGA of the SIMON32/64 Cryptosystem

open access: yesVisión Electrónica, 2022
In the rise of digital transformation, information security is positioned in a prominent place because it provides confidence to society in the use of information technologies. For this reason, there is growing research in this area.
José Gabriel Rincón-González   +2 more
doaj  

Real‐World Cost‐Effectiveness of a Standardized Education and Exercise Therapy Program for Hip and Knee Osteoarthritis Compared to Usual Care

open access: yesArthritis Care &Research, EarlyView.
Objective We estimated the real‐world cost‐effectiveness of a standardized education and exercise therapy program (GLA:D) compared to usual care (UC) for people managing hip and/or knee osteoarthritis (HKOA). Methods We used a prospective matched cohort design to recruit people (aged >45 years) diagnosed with HKOA who used GLA:D or UC (not on a ...
Darren R. Mazzei   +4 more
wiley   +1 more source

Color Image Encryption Using Hybrid Method of Fractal-Based Key and Private XOR Key [PDF]

open access: yesKirkuk Journal of Science, 2018
The main idea of image encryption is to ensure secure transmitting it in the open network by transforming the image to not understandable form so that unauthorized person cannot decrypt and see it.
Faten H. MohammedSediq   +2 more
doaj   +1 more source

Biased RSA Private Keys: Origin Attribution of GCD-Factorable Keys [PDF]

open access: yes, 2020
In 2016, Svenda et al. (USENIX 2016, The Million-key Question) reported that the implementation choices in cryptographic libraries allow for qualified guessing about the origin of public RSA keys. We extend the technique to two new scenarios when not only public but also private keys are available for the origin attribution - analysis of a source of ...
Janovsky, Adam   +4 more
openaire   +4 more sources

Ageism in Rheumatology: The Health Care Professional's Perspective

open access: yesArthritis Care &Research, EarlyView.
Objective Ageism (age‐based stereotypes, prejudice, or discrimination) is prevalent and linked to prolonged disability and reduced lifespan in older adults. Little is known about ageism within rheumatology. This study explores the health care professional's (HCP) perception of the care of older adults and how ageist attitudes or perspectives may impact
Aaron P. Smith   +4 more
wiley   +1 more source

Private data isolation for OpenSSH based on virtual machines

open access: yesTongxin xuebao, 2009
OpenSSH stores keys in the file system.The keys are easy to be exposed while the host has been invaded by illegal users.Methods are needed to protect these important data.For such purpose,virtual machine protection was pro-posed to provide a separate ...
CHEN Kang, YU Hong-liang, ZHENG Wei-min
doaj   +2 more sources

Practical Inner Product Encryption with Constant Private Key

open access: yesApplied Sciences, 2020
Inner product encryption, first introduced by Katz et al., is a type of predicate encryption in which a ciphertext and a private key correspond to an attribute vector and a predicate vector, respectively.
Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso
doaj   +1 more source

Post-quantum cryptography-driven security framework for cloud computing

open access: yesOpen Computer Science, 2022
Data security in the cloud has been a major issue since the inception and adoption of cloud computing. Various frameworks have been proposed, and yet data breach prevails.
Ukwuoma Henry Chima   +3 more
doaj   +1 more source

The internet and public–private governance in the European Union [PDF]

open access: yes, 2006
The EU plays a significant role in public policy aspects of Internet governance, having created in the late 1990s the dot eu Internet Top Level Domain (TLD). This enables users to register names under a European online address label.
Christou, George, Simpson, Seamus
core   +1 more source

Home - About - Disclaimer - Privacy