Results 51 to 60 of about 3,071,363 (328)
Association of the ICH Score With Withdrawal of Life‐Sustaining Treatment Over a 10‐Year Period
ABSTRACT Objective The intracerebral hemorrhage (ICH) score was developed to enhance provider communication and facilitate early severity assessment. We examined the association of the ICH score with mortality and withdrawal of life‐sustaining treatment (WLST) in a large, multicenter stroke registry, and evaluated temporal trends in these associations.
Nina Massad+15 more
wiley +1 more source
Design and parallel implementation on Artix-7 FPGA of the SIMON32/64 Cryptosystem
In the rise of digital transformation, information security is positioned in a prominent place because it provides confidence to society in the use of information technologies. For this reason, there is growing research in this area.
José Gabriel Rincón-González+2 more
doaj
Objective We estimated the real‐world cost‐effectiveness of a standardized education and exercise therapy program (GLA:D) compared to usual care (UC) for people managing hip and/or knee osteoarthritis (HKOA). Methods We used a prospective matched cohort design to recruit people (aged >45 years) diagnosed with HKOA who used GLA:D or UC (not on a ...
Darren R. Mazzei+4 more
wiley +1 more source
Color Image Encryption Using Hybrid Method of Fractal-Based Key and Private XOR Key [PDF]
The main idea of image encryption is to ensure secure transmitting it in the open network by transforming the image to not understandable form so that unauthorized person cannot decrypt and see it.
Faten H. MohammedSediq+2 more
doaj +1 more source
Biased RSA Private Keys: Origin Attribution of GCD-Factorable Keys [PDF]
In 2016, Svenda et al. (USENIX 2016, The Million-key Question) reported that the implementation choices in cryptographic libraries allow for qualified guessing about the origin of public RSA keys. We extend the technique to two new scenarios when not only public but also private keys are available for the origin attribution - analysis of a source of ...
Janovsky, Adam+4 more
openaire +4 more sources
Ageism in Rheumatology: The Health Care Professional's Perspective
Objective Ageism (age‐based stereotypes, prejudice, or discrimination) is prevalent and linked to prolonged disability and reduced lifespan in older adults. Little is known about ageism within rheumatology. This study explores the health care professional's (HCP) perception of the care of older adults and how ageist attitudes or perspectives may impact
Aaron P. Smith+4 more
wiley +1 more source
Private data isolation for OpenSSH based on virtual machines
OpenSSH stores keys in the file system.The keys are easy to be exposed while the host has been invaded by illegal users.Methods are needed to protect these important data.For such purpose,virtual machine protection was pro-posed to provide a separate ...
CHEN Kang, YU Hong-liang, ZHENG Wei-min
doaj +2 more sources
Practical Inner Product Encryption with Constant Private Key
Inner product encryption, first introduced by Katz et al., is a type of predicate encryption in which a ciphertext and a private key correspond to an attribute vector and a predicate vector, respectively.
Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso
doaj +1 more source
Post-quantum cryptography-driven security framework for cloud computing
Data security in the cloud has been a major issue since the inception and adoption of cloud computing. Various frameworks have been proposed, and yet data breach prevails.
Ukwuoma Henry Chima+3 more
doaj +1 more source
The internet and public–private governance in the European Union [PDF]
The EU plays a significant role in public policy aspects of Internet governance, having created in the late 1990s the dot eu Internet Top Level Domain (TLD). This enables users to register names under a European online address label.
Christou, George, Simpson, Seamus
core +1 more source