نتایج جستجو برای: tls
تعداد نتایج: 3171 فیلتر نتایج به سال:
TLS is the most important cryptographic protocol in use today. However, up to now there is no complete cryptographic security proof in the standard model, nor in any other model. We give the first such proof for the core cryptographic protocol of TLS ciphersuites based on ephemeral Diffie-Hellman key exchange (TLS-DHE), which include the cipher suite TLS DHE DSS WITH 3DES EDE CBC SHA mandatory ...
FUS/TLS is an RNA/DNA-binding protein associated with neurodegenerative diseases including amyotrophic lateral sclerosis and frontotemporal lobar degeneration. Previously, we found that a prion-like domain in the N-terminus of FUS/TLS mediates co-aggregation between FUS/TLS and mutant huntingtin, the gene product of Huntington's disease (HD). Here, we show that heterozygous knockout of FUS/TLS ...
Terrestrial Laser Scanner (TLS) technology, have altered quickly data acquisition for map production in surveying. In many cases, it is impossible to complete surveying of the desired area without TLS displacement in one station to another. Occlusion is innate in data acquisition, with this type of device. To solve this problem, TLS devices should be placed in different locations and scanning o...
To filter SSL/TLS-protected traffic, some antivirus and parental-control applications interpose a TLS proxy in the middle of the host’s communications. We set out to analyze such proxies as there are known problems in other (more matured) TLS processing engines, such as browsers and common TLS libraries. Compared to regular proxies, client-end TLS proxies impose several unique constraints, and ...
This document specifies PT-TLS, a TLS-based Posture Transport (PT) protocol. The PT-TLS protocol carries the Network Endpoint Assessment (NEA) message exchange under the protection of a Transport Layer Security (TLS) secured tunnel.
To filter SSL/TLS-protected traffic, some antivirus and parental-control applications interpose a TLS proxy in the middle of the host’s communications. We set out to analyze such proxies as there are known problems in other (more matured) TLS processing engines, such as browsers and common TLS libraries. Compared to regular proxies, client-end TLS proxies impose several unique constraints, and ...
Guidelines for the management of pediatric and adult tumor lysis syndrome: an evidence-based review.
PURPOSE Tumor lysis syndrome (TLS) has recently been subclassified into either laboratory TLS or clinical TLS, and a grading system has been established. Standardized guidelines, however, are needed to aid in the stratification of patients according to risk and to establish prophylaxis and treatment recommendations for patients at risk or with established TLS. METHODS A panel of experts in pe...
The distinction of non-epileptic from epileptic events is difficult even for experienced neurologists. We retrospectively evaluated 59 dialeptic events from 27 patients admitted for video EEG monitoring to check whether heart rate (HR) analysis could help in differentiating dialeptic complex partial temporal lobe seizures (TLS) from dialeptic simple partial TLS, and non-epileptic dialeptic even...
In the development of TLS 1.3, the IETF TLS Working Group has adopted an “analysis-prior-to-deployment” design philosophy. This is in sharp contrast to all previous versions of the protocol. We present an account of the TLS standardisation narrative, examining the differences between the reactive standardisation process for TLS 1.2 and below, and the more proactive standardisation process for T...
Tumor lysis syndrome (TLS) is a potentially deadly complication of tumors or their treatment. This syndrome consists of a constellation of laboratory findings such as hyperuricemia, hyperkalemia, hyperphosphatemia, and hypocalcemia, known as laboratory TLS. When clinical complications such as seizures, acute renal failure, and cardiac dysrhythmias occur in patients with laboratory TLS, the synd...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید