نتایج جستجو برای: needle exchange programs
تعداد نتایج: 421140 فیلتر نتایج به سال:
OBJECTIVE To determine whether providing a needle exchange program to prevent HIV transmission among injection drug users would cost less than the health care consequences of not having such a program. DESIGN Incidence outcome model to estimate the number of cases of HIV infection that this program would prevent over 5 years, assuming that the HIV incidence rate would be 2% with the program a...
Injecting drug users (IDUs) are at high risk for infection by human immunodeficiency virus (HIV) and other blood-borne pathogens. In the United States, IDUs account for nearly one-third of the cases of acquired immunodeficiency syndrome (AIDS), either directly or indirectly (heterosexual and perinatal cases of AIDS where the source of infection was an IDU). IDU also account for a substantial pr...
When Internet Key Exchange Protocol version 2 (IKEv2) is used for remote VPN access (client to VPN gateway), the gateway assigns the client an IP address from the internal network using IKEv2 configuration payloads. The configuration payloads specified in RFC 4306 work well for IPv4 but make it difficult to use certain features of IPv6. This document specifies new configuration attributes for I...
This document describes the Kerberized Internet Negotiation of Keys (KINK) protocol. KINK defines a low-latency, computationally inexpensive, easily managed, and cryptographically sound protocol to establish and maintain security associations using the Kerberos authentication system. KINK reuses the Quick Mode payloads of the Internet Key Exchange (IKE), which should lead to substantial reuse o...
Dynamic group Diie-Hellman protocols for Authenticated Key Exchange (AKE) are designed to work in a scenario in which the group membership is not known in advance but where parties may join and may also leave the multicast group at any given time. While several schemes have been proposed to deal with this scenario no formal treatment for this cryptographic problem has ever been suggested. In th...
Recently, Eun-Jun et al.'s proposed an improvement of the authentication key exchange protocol. In their protocol, they proved that neither Hung et al.’s nor Tian et al.’s provide perfect forward secrecy, and present an improved protocol in order to address this problem. In this paper, we will demonstrate some security leaks inherent in Eun-Jun et al.'s protocol and show that this protocol is s...
This paper presents a new option that can be used by agents for managing foreign exchange risk. Unlike the Garman Kolhagen model [1], (GK), this paper presents a new model with a preset exchange rate (PE), that allows the agent to take advantage of the his/her view on both the direction and magnitude of rate movement and as such provides this agent with more choices. The model has a provision f...
This document defines a generic way for Internet Key Exchange version 2 (IKEv2) to use any of the symmetric secure password authentication methods. Multiple methods are already specified in other documents, and this document does not add any new one. This document specifies a way to agree on which method is to be used in the current connection. This document also provides a common way to transm...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید