Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Secure - resin cement

Known as: Secure resin cement, secure, secures 
 
National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Software Defined Network (SDN) brings additional flexibility to the traditional network allowing the implementation of… Expand
  • figure 1
  • table II
  • table III
  • figure 4
  • table IV
Is this relevant?
2016
2016
The secure enclave processor (SEP) was introduced by Apple as part of the A7 SOC with the release of the iPhone 5S, most notably… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • figure 1
Is this relevant?
2013
2013
Background Virtual (non-face-to-face) medication reconciliation strategies may reduce adverse drug events (ADEs) among vulnerable… Expand
Is this relevant?
2012
2012
For the last decade, perhaps the most commonly used type of end-user security has been the HTTP Secure (HTTPS) protocol employed… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2011
2011
This paper presents a novel mutual identity authentication scheme which can be applied securely in Internet of Things. Based on… Expand
Is this relevant?
2011
2011
Secure routing is an important issue in MANETs. Routing protocols can have vulnerabilities that may be exploited by malicious… Expand
  • table I
  • figure 1
  • table II
  • figure 2
  • figure 3
Is this relevant?
2011
2011
In mobile ad hoc wireless network (MANET), secure communication is more challenging task due to its fundamental characteristics… Expand
  • figure 1
  • table 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
To better understand the origins of autonomic reactivity during marital interactions, this study examined the psychophysiological… Expand
Is this relevant?
2003
2003
The cryptographic algorithms employed in Internet security must be able to handle packets which may vary in size over a large… Expand
  • figure 1
  • figure 2
  • figure 5
  • table 1
  • table 2
Is this relevant?
1987
1987
A noninterference formulation ofMLS applicable tothe Secure AdanTarget (SAT)Abstract Modelisdeveloped. Ananalogous formulation… Expand
Is this relevant?