Results 101 to 110 of about 5,288,295 (302)

Security of Quantum Key Distribution

open access: yes, 2016
The security issues facing quantum key distribution (QKD) are explained, herein focusing on those issues that are cryptographic and information theoretic in nature and not those based on physics. The problem of security criteria is addressed.
Yuen, Horace
core   +1 more source

Does Long‐Term Lower Extremity Strength Training in Adults With Knee Osteoarthritis and Varus Alignment Reduce Knee Joint Loading During Gait?

open access: yesArthritis Care &Research, EarlyView.
Objective We examined whether 18 months of strength training in individuals with knee varus alignment and medial tibiofemoral osteoarthritis (OA) reduced knee joint loads during walking compared to an attention control group. Methods This study was a secondary analysis of a randomized clinical trial that compared the effects of strength training to a ...
Stephen P. Messier   +12 more
wiley   +1 more source

Publisher Correction: Refinement of an ovine-based immunoglobulin therapy against SARS-CoV-2, with comparison of whole IgG versus F(ab′)2 fragments

open access: yesScientific Reports, 2023
Stephen Findlay‑Wilson   +23 more
doaj   +1 more source

Diagnostic Accuracy of Thyroid Ultrasound in Non-Toxic Nodules in a Mexican Population

open access: yesRevista de Investigación e Innovación en Ciencias de la Salud
Introduction. Thyroid nodules are common and distinguishing benign from malignant lesions, especially in non-toxic nodules, remains a clinical challenge. Objective.
Eder Fernando Ríos-Bracamontes   +8 more
doaj   +1 more source

Security Policy Consistency

open access: yes, 2000
With the advent of wide security platforms able to express simultaneously all the policies comprising an organization's global security policy, the problem of inconsistencies within security policies become harder and more relevant.
Ferreira, Paulo   +3 more
core   +2 more sources

Arguing security: validating security requirements using structured argumentation [PDF]

open access: yes, 2005
This paper proposes using both formal and structured informal arguments to show that an eventual realized system can satisfy its security requirements. These arguments, called 'satisfaction arguments', consist of two parts: a formal argument based upon ...
Haley, Charles B.   +3 more
core   +2 more sources

Nonmalleable Information Flow: Technical Report

open access: yes, 2017
Noninterference is a popular semantic security condition because it offers strong end-to-end guarantees, it is inherently compositional, and it can be enforced using a simple security type system.
Arden, Owen   +2 more
core   +1 more source

Prevalence of Systemic Lupus Erythematosus in Australia, 2010–2022: A Population‐Based Study Using Linked National Administrative Health Data

open access: yesArthritis Care &Research, EarlyView.
Objective Systemic lupus erythematosus (SLE) is a heterogenous inflammatory condition with widely varying global prevalence estimates. The frequency of SLE in the general population of Australia has been reported to be notably lower than contemporary estimates in countries such as the United States or United Kingdom, at 19 to 39 per 100,000 as opposed ...
Lucinda Roper   +7 more
wiley   +1 more source

Decoding the shadows: multi-modal identity profiling in darknet markets using latent behavior feature fusion

open access: yesDiscover Applied Sciences
The Darknet marketplace, operating on anonymous communication techniques, has become a central hub for illicit trade, enabling elusive vendors to engage in illegal activities.
Xuan Zhang   +6 more
doaj   +1 more source

Detection of Electric Network Frequency in Audio Using Multi-HCNet

open access: yesSensors
With the increasing application of electrical network frequency (ENF) in forensic audio and video analysis, ENF signal detection has emerged as a critical technology.
Yujin Li   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy