咨询与建议

限定检索结果

文献类型

  • 2 篇 期刊文献

馆藏范围

  • 2 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 医学
    • 1 篇 临床医学
    • 1 篇 医学技术(可授医学...

主题

  • 2 篇 success rates
  • 1 篇 timing attacks
  • 1 篇 profiling attack...
  • 1 篇 procedure time
  • 1 篇 intraosseous acc...
  • 1 篇 pain score
  • 1 篇 central venous c...
  • 1 篇 dirichlet priors

机构

  • 1 篇 ltci télécom par...
  • 1 篇 secure-ic s.a.s ...
  • 1 篇 department of em...

作者

  • 1 篇 wei gao
  • 1 篇 darshana jayasin...
  • 1 篇 eloi de chérisey
  • 1 篇 kang zheng
  • 1 篇 olivier rioul
  • 1 篇 yu-peng wang
  • 1 篇 sylvain guilley
  • 1 篇 qing-bian ma
  • 1 篇 yan-yan liu
  • 1 篇 ya-an zheng
  • 1 篇 ling-yun zu

语言

  • 2 篇 英文
检索条件"主题词=Success rates"
2 条 记 录,以下是1-10 订阅
排序:
Comparison of intraosseous access and central venous catheterization in Chinese adult emergency patients: A prospective, multicenter, and randomized study
收藏 引用
World Journal of Emergency Medicine 2021年 第2期12卷 105-110页
作者: Yan-yan Liu Yu-peng Wang Ling-yun Zu Kang Zheng Qing-bian Ma Ya-an Zheng Wei Gao Department of Cardiology and Institute of Vascular Medicine Peking University Third HospitalNHC Key Laboratory of Cardiovascular Molecular Biology and Regulatory PeptidesKey Laboratory of Molecular Cardiovascular SciencesMinistry of EducationBeijing Key Laboratory of Cardiovascular Receptors ResearchBeijing 100191China Department of Emergency Medicine Peking University Third HospitalBeijing 100191China
BACKGROUND: It is challenging to establish peripheral intravenous access in adult critically patients. This study aims to compare the success rate of the first attempt, procedure time, operator satisfaction with the u... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Information Theoretic Distinguishers for Timing Attacks with Partial Profiles: Solving the Empty Bin Issue
收藏 引用
Journal of Information Security 2021年 第1期12卷 1-33页
作者: Eloi De Chérisey Sylvain Guilley Olivier Rioul Darshana Jayasinghe LTCI Télécom Paris Institut Polytechnique de Paris France Secure-IC S.A.S Tour Montparnasse Paris France
In any side-channel attack, it is desirable to exploit all the available leakage data to compute the distinguisher’s values. The profiling phase is essential to obtain an accurate leakage model, yet it may not be exh... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论