نتایج جستجو برای: needle exchange programs

تعداد نتایج: 421140  

Journal: :CMAJ : Canadian Medical Association journal = journal de l'Association medicale canadienne 1997
M Gold A Gafni P Nelligan P Millson

OBJECTIVE To determine whether providing a needle exchange program to prevent HIV transmission among injection drug users would cost less than the health care consequences of not having such a program. DESIGN Incidence outcome model to estimate the number of cases of HIV infection that this program would prevent over 5 years, assuming that the HIV incidence rate would be 2% with the program a...

Journal: :Public health reports 1998
D Vlahov B Junge

Injecting drug users (IDUs) are at high risk for infection by human immunodeficiency virus (HIV) and other blood-borne pathogens. In the United States, IDUs account for nearly one-third of the cases of acquired immunodeficiency syndrome (AIDS), either directly or indirectly (heterosexual and perinatal cases of AIDS where the source of infection was an IDU). IDU also account for a substantial pr...

2010
P. Eronen

When Internet Key Exchange Protocol version 2 (IKEv2) is used for remote VPN access (client to VPN gateway), the gateway assigns the client an IP address from the internal network using IKEv2 configuration payloads. The configuration payloads specified in RFC 4306 work well for IPv4 but make it difficult to use certain features of IPv6. This document specifies new configuration attributes for I...

2006
S. Sakane K. Kamada

This document describes the Kerberized Internet Negotiation of Keys (KINK) protocol. KINK defines a low-latency, computationally inexpensive, easily managed, and cryptographically sound protocol to establish and maintain security associations using the Kerberos authentication system. KINK reuses the Quick Mode payloads of the Internet Key Exchange (IKE), which should lead to substantial reuse o...

2001
Emmanuel Bresson Olivier Chevassut David Pointcheval

Dynamic group Diie-Hellman protocols for Authenticated Key Exchange (AKE) are designed to work in a scenario in which the group membership is not known in advance but where parties may join and may also leave the multicast group at any given time. While several schemes have been proposed to deal with this scenario no formal treatment for this cryptographic problem has ever been suggested. In th...

2012
Tamer Barakat

Recently, Eun-Jun et al.'s proposed an improvement of the authentication key exchange protocol. In their protocol, they proved that neither Hung et al.’s nor Tian et al.’s provide perfect forward secrecy, and present an improved protocol in order to address this problem. In this paper, we will demonstrate some security leaks inherent in Eun-Jun et al.'s protocol and show that this protocol is s...

2013
Avner Wolf Christopher Hessel

This paper presents a new option that can be used by agents for managing foreign exchange risk. Unlike the Garman Kolhagen model [1], (GK), this paper presents a new model with a preset exchange rate (PE), that allows the agent to take advantage of the his/her view on both the direction and magnitude of rate movement and as such provides this agent with more choices. The model has a provision f...

2011
T. Kivinen

This document defines a generic way for Internet Key Exchange version 2 (IKEv2) to use any of the symmetric secure password authentication methods. Multiple methods are already specified in other documents, and this document does not add any new one. This document specifies a way to agree on which method is to be used in the current connection. This document also provides a common way to transm...

Journal: :JAIDS Journal of Acquired Immune Deficiency Syndromes 2001

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید