Results 51 to 60 of about 13,481,561 (335)
Security proof of a three-state quantum key distribution protocol without rotational symmetry [PDF]
Standard security proofs of quantum key distribution (QKD) protocols often rely on symmetry arguments. In this paper, we prove the security of a three-state protocol that does not possess rotational symmetry.
C. H. Bennett +10 more
core +2 more sources
Psychosocial Outcomes in Patients With Endocrine Tumor Syndromes: A Systematic Review
ABSTRACT Introduction The combination of disease manifestations, the familial burden, and varying penetrance of endocrine tumor syndromes (ETSs) is unique. This review aimed to portray and summarize available data on psychosocial outcomes in patients with ETSs and explore gaps and opportunities for future research and care.
Daniël Zwerus +6 more
wiley +1 more source
Modernization of Institutional and Economic Management Tools for Environmental Safety of Enterprises
This study investigates the institutional and economic mechanisms employed for managing the environmental safety of enterprises in Ukraine and the European Union.
Arthur Amber
doaj +1 more source
A Systematic Review of the State of Cyber-Security in Water Systems
Critical infrastructure systems are evolving from isolated bespoke systems to those that use general-purpose computing hosts, IoT sensors, edge computing, wireless networks and artificial intelligence.
N. Tuptuk +3 more
semanticscholar +1 more source
ABSTRACT Introduction We developed MedSupport, a multilevel medication adherence intervention designed to address root barriers to medication adherence. This study sought to explore the feasibility and acceptability of the MedSupport intervention strategies to support a future full‐scale randomized controlled trial.
Elizabeth G. Bouchard +8 more
wiley +1 more source
The United Nations and 21st century security challenges in Colombia
Multifaceted 21st-century security challenges, such as terrorism, pandemics, illegal migration, and drug trafficking, permanently question the adequacy of both state and global organizations to guarantee general wellbeing, the rule of law, and the ...
Fredy Leonardo Galindo-García +1 more
doaj +1 more source
Post-selection technique for quantum channels with applications to quantum cryptography [PDF]
We propose a general method for studying properties of quantum channels acting on an n-partite system, whose action is invariant under permutations of the subsystems.
Christandl, Matthias +2 more
core +2 more sources
‘Killing a mosquito with a hammer’: Al-Shabaab violence and state security responses in Kenya
Networked, transnational forms of violence pose a significant threat to peace and security in a number of sub-Saharan African countries. In recent years, Kenya has witnessed an expanding number of attacks involving Al-Shabaab – the Somali-based militant ...
J. Lind, P. Mutahi, M. Oosterom
semanticscholar +1 more source
ABSTRACT Background/Objectives Osteosarcoma is a radioresistant tumor that may benefit from stereotactic body radiation therapy (SBRT) for locoregional control in metastatic/recurrent disease. We report institutional practice patterns, outcomes, toxicity, and failures in osteosarcoma patients treated with SBRT.
Jenna Kocsis +13 more
wiley +1 more source
REGULATORY AND LEGAL COMPONENT IN ENSURING STATE’S FINANCIAL SECURITY
The purpose of the study is to scientifically substantiate the place and role of regulatory support in the formation of financial security, study the factors influencing its level and identify ways to improve it.
N. Rushchyshyn +4 more
semanticscholar +1 more source

