Learn More
The TCP/IP suite, the basis for today’s Internet, lacks even the most basic mechanisms of authentication. As usage of the Internet increases, its scarcity of built-in security becomes more and more problematic. This paper describes serious attacks against IP control and management protocols with an accent on the ICMP protocol, as well as some of the(More)
Storage Area Networks, with their ability to offer high data availability, reliability and scalability, are a promising solution for the large scale storage needs of many enterprises. As with any distributed storage system, a major design challenge for a Storage Area Network (SAN) is to provide data integrity and confidentiality. In this paper, we propose a(More)
INTRODUCTION After initial treatment, differentiated thyroid cancer (DTC) patients are stratified as low and high risk based on clinical/pathological features. Recently, a risk stratification based on additional clinical data accumulated during follow-up has been proposed. OBJECTIVE To evaluate the predictive value of delayed risk stratification (DRS)(More)
This document describes a symmetric encryption protocol that supplements the protocols described in the User-based Security Model (USM), which is a Security Subsystem for version 3 of the Simple Network Management Protocol for use in the SNMP Architecture. The symmetric encryption protocol described in this document is based on the Advanced Encryption(More)
The research community has considered in the past the application of Artificial Intelligence (AI) techniques to control and operate networks. A notable example is the Knowledge Plane proposed by D.Clark et al. However, such techniques have not been extensively prototyped or deployed in the field yet. In this paper, we explore the reasons for the lack of(More)
BACKGROUND In differentiated thyroid cancer (DTC) patients at intermediate risk of recurrences, no evidences are provided regarding the optimal radioactive iodine (RAI) activity to be administered for post-surgical thyroid ablation. METHODS This study aimed to evaluate the impact of RAI activities on the outcome of 225 DTC patients classified as(More)
Context A substantial proportion of athyreotic levothyroxine (LT4)-treated patients experience hypothyroid-like symptoms. During LT4 replacement, levels of the active hormone triiodothyronine (T3) strictly depend on type 2-deiodinase (D2)-mediated activation of LT4. The Thr92Ala polymorphism and the 258 G/A in the DIO2 gene have been associated with various(More)
Embedding user subscription time into cryptographic key generation and assignment for hierarchical access control has raised tremendous interest among researchers and practitioners in multicast, broadcast, and secure group communication fields. During the subscription period, a user of a higher class can compute the (time-bound) keys of his/her own class(More)
Even though the theory behind digital signatures is fully understood and the related cryptographic methods have proved the efficiency in deploying security services, concrete application of digital signature to real electronic documents is still hindered by the lack of standards. In particular, we lack standards for the format of the data to be signed, the(More)