Results 61 to 70 of about 7,114,774 (349)
Background The UK’s National Health Service Test and Trace (NHSTT) program aimed to provide the most effective and accessible SARS-CoV-2 testing approach possible.
Matthias E. Futschik +18 more
doaj +1 more source
The security of practical quantum key distribution [PDF]
Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a ...
V. Scarani +5 more
semanticscholar +1 more source
Security Rules versus Security Properties [PDF]
There exist many approaches to specify and to define security policies. We present here a framework in which the basic components of security policies can be expressed, and we identify their role in the description of a policy, of a system and of a secure system.
openaire +1 more source
Global Health Security: Security for whom? Security from what? [PDF]
The concept of ‘health security’ has been increasingly apparent in recent years in both academic and policy discourses on transborder infectious disease threats. Yet it has been noted that there are a range of conceptualisations of ‘health security’ in circulation and that confusion over the concept is creating international tensions with some states (
openaire +1 more source
Sustainable bioplastics manufacturing from renewable sources
Bioplastics are manufactured by using polymers from different bio‐based sources. These novel materials not only offer biodegradability but also possess various functional properties that make them suitable for diverse applications. Recent developments in the preparation of bioplastics are reported, highlighting the distinct properties of each type of ...
C. Valeria L. Giosafatto +6 more
wiley +1 more source
Web development evolution: the assimilation of web engineering security [PDF]
In today’s e-commerce environment, information is an incredibly valuable asset. Surveys indicate that companies are suffering staggering financial losses due to web security issues.
Glisson, W.B., Welland, R.
core +1 more source
Tracking Motor Progression and Device‐Aided Therapy Eligibility in Parkinson's Disease
ABSTRACT Objective To characterise the progression of motor symptoms and identify eligibility for device‐aided therapies in Parkinson's disease, using both the 5‐2‐1 criteria and a refined clinical definition, while examining differences across genetic subgroups.
David Ledingham +7 more
wiley +1 more source
Feature Graph Construction With Static Features for Malware Detection
Malware can greatly compromise the integrity and trustworthiness of information and is in a constant state of evolution. Existing feature fusion-based detection methods generally overlook the correlation between features.
Binghui Zou +6 more
doaj +1 more source
Exploratory Analysis of ELP1 Expression in Whole Blood From Patients With Familial Dysautonomia
ABSTRACT Background Familial dysautonomia (FD) is a hereditary neurodevelopmental disorder caused by aberrant splicing of the ELP1 gene, leading to a tissue‐specific reduction in ELP1 protein expression. Preclinical models indicate that increasing ELP1 levels can mitigate disease manifestations.
Alejandra González‐Duarte +13 more
wiley +1 more source
Complexity and Unwinding for Intransitive Noninterference [PDF]
The paper considers several definitions of information flow security for intransitive policies from the point of view of the complexity of verifying whether a finite-state system is secure. The results are as follows.
Eggert, Sebastian +3 more
core

