Results 91 to 100 of about 2,069,680 (303)

A simple proof of unconditional security of relativistic quantum cryptography [PDF]

open access: yesJournal of Experimental and Theoretical Physics, 2001
11 pages, 1 figure (typos in Eqs. 2, 7 and 8 are corrected)
Molotkov, S. N., Nazin, S. S.
openaire   +2 more sources

Patterns of Postictal Abnormalities in Relation to Status Epilepticus in Adults

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Abnormalities on peri‐ictal diffusion‐weighted magnetic resonance imaging (DWI‐PMAs) are well‐established for patients with status epilepticus (SE), but knowledge on patterns of DWI‐PMAs and their prognostic impact is sparse. Methods This systematic review and individual participant data meta‐analysis included observational studies ...
Andrea Enerstad Bolle   +11 more
wiley   +1 more source

​Did a Non‐Medical Biosimilar Switching Policy Cause an Increase in Non‐Biologic/Biosimilar Health Care Resource Utilization or Cost in Patients With Inflammatory Arthritis?

open access: yesArthritis Care &Research, EarlyView.
Objective This study aimed to evaluate the impact of a series of policies that mandated switching patients with inflammatory arthritis (IA) from an originator biologic to a biosimilar in British Columbia, Canada, on health care resource use and cost.
HaoHung Dang   +4 more
wiley   +1 more source

Lived and Care Experiences of Chronic Musculoskeletal Shoulder Pain in Australian Adults: A Qualitative Study

open access: yesArthritis Care &Research, EarlyView.
Objective Australian evidence on lived and care experiences of chronic musculoskeletal shoulder pain (CMSP), irrespective of disorder classification or disease, is limited. However, such evidence is important for person‐centered care and informing local service pathways and care guidelines or standards.
Sonia Ranelli   +8 more
wiley   +1 more source

Mutual authentication quantum key agreement protocol with single-particle measurement

open access: yesFrontiers in Physics
In this paper, a mutual authentication quantum key agreement protocol with single-particle measurement is proposed. The participants can authenticate each other’s identity through their secret identity information and the entanglement property of Bell ...
Hao Yang   +4 more
doaj   +1 more source

Cash‐based approaches in humanitarian emergencies: a systematic review

open access: yesCampbell Systematic Reviews, 2017
This Campbell systematic review examines the effectiveness, efficiency and implementation of cash transfers in humanitarian settings. The review summarises evidence from five studies of effects, 10 studies of efficiency and 108 studies of barriers and ...
Shannon Doocy, Hannah Tappis
doaj   +1 more source

Decoy State Quantum Key Distribution

open access: yes, 2005
There has been much interest in quantum key distribution. Experimentally, quantum key distribution over 150 km of commercial Telecom fibers has been successfully performed. The crucial issue in quantum key distribution is its security. Unfortunately, all
Chen, Kai, Lo, Hoi-Kwong, Ma, Xiongfeng
core   +1 more source

Quantum bit commitment and unconditional security

open access: yes, 2002
45 pages; see note on the title page for changes from the previous ...
openaire   +2 more sources

Economic Burden of Rheumatoid Arthritis in Low‐ and Middle‐Income Countries: Systematic Review and Meta‐Analysis

open access: yesArthritis Care &Research, EarlyView.
Objective The aim of this systematic review was to synthesize the economic impact of rheumatoid arthritis (RA) on households, health systems, and society in low‐ and middle‐income countries (LMICs). Methods Electronic databases such as PubMed, Web of Science, and CINAHL were searched using keywords related to RA and cost of illness.
Tadesse Gebrye   +6 more
wiley   +1 more source

Quantum solution for secure information transmission of wearable devices

open access: yesInternational Journal of Distributed Sensor Networks, 2018
Currently, wearable devices are developing prosperously in the fields of global communication electronic products and personal intelligent terminals, but their information security problem cannot be ignored.
Xiaojun Wen   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy