Results 61 to 70 of about 10,420 (190)

Quantum Resistance Saber-Based Group Key Exchange Protocol for IoT

open access: yesIEEE Open Journal of the Communications Society
Quantum computing poses a threat on current cryptography methods, prompting initiatives such as the U.S. National Institute for Standards and Technology (NIST) standardization process toward developing post-quantum cryptographic tools.
Fouzia Samiullah   +3 more
doaj   +1 more source

Efficient Side-Channel Protections of ARX Ciphers

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
The current state of the art of Boolean masking for the modular addition operation in software has a very high performance overhead. Firstly, the instruction count is very high compared to a normal addition operation.
Bernhard Jungk   +2 more
doaj   +1 more source

Mucosal‐Associated Invariant T Cells: Origins, Biological Functions, Diseases, and Therapeutic Targets

open access: yesMedComm, Volume 6, Issue 11, November 2025.
Mucosa‐associated invariant T (MAIT) cells are an evolutionarily conserved class of innate‐like T lymphocytes that rely on MR1 molecules to recognize microbial metabolites and play a central role in immune surveillance and inflammatory regulation.
Cheng Zhu   +10 more
wiley   +1 more source

Exploring the Neuropharmacological and Antipyretic Effects of Syzygium grande (Wight) Walp. Methanolic Leaf Extract: An In Vivo and Computational Study Incorporating GC–MS/MS Analysis

open access: yesFood Science &Nutrition, Volume 13, Issue 10, October 2025.
This study was designed to explore the pharmacological effects of the methanol extract derived from S. grande leaves (MESG) on Swiss albino mice. The extract displayed significant anxiolytic, sedative, and antipyretic effects with moderate antidepressant effects.
Md. Jahirul Islam Mamun   +4 more
wiley   +1 more source

Polynomial Multiplication in NTRU Prime

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
This paper proposes two different methods to perform NTT-based polynomial multiplication in polynomial rings that do not naturally support such a multiplication. We demonstrate these methods on the NTRU Prime key-encapsulation mechanism (KEM) proposed by
Erdem Alkim   +10 more
doaj   +3 more sources

KyberSlash: Exploiting secret-dependent division timings in Kyber implementations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
This paper presents KyberSlash1 and KyberSlash2 – two timing vulnerabilities in several implementations (including the official reference code) of the Kyber Post-Quantum Key Encapsulation Mechanism, recently standardized as ML-KEM.
Daniel J. Bernstein   +9 more
doaj   +1 more source

IOT based Energy Meter Monitoring using ARM Cortex M4 with Android Application

open access: yesInternational Journal of Computer Applications, 2016
Internet of Things (IOT) aims at interfacing different gadgets to the internet web – encouraging human-machine and machine-machine connections offering superior security, console and effectiveness. The concept of IOT is utilized in this model, remote monitoring of energy meter which is intended to overcome the issues in existing Automatic Meter Reading
U. B., Rashmi M.
openaire   +1 more source

Security for the Industrial IoT: The Case for Information-Centric Networking

open access: yes, 2018
Industrial production plants traditionally include sensors for monitoring or documenting processes, and actuators for enabling corrective actions in cases of misconfigurations, failures, or dangerous events.
Frey, Michael   +7 more
core   +1 more source

Neuroprotective effects of remote limb ischemic preconditioning through enhanced cerebral blood flow via activation of the PI3K/AKT pathway in ischemic stroke

open access: yesVIEW, Volume 6, Issue 5, October 2025.
Stroke is a leading cause of death and disability worldwide, often due the inadequate restoration of cerebral blood flow following vascular recanalization. Our study demonstrates that a simple technique called RLIPC (remote limb ischemic preconditioning), which involves briefly restricting blood flow in a limb, protects the brain during a stroke by ...
Chaoran Dou   +8 more
wiley   +1 more source

Novel ultrasonic distance measuring system based on correlation method

open access: yesArchives of Electrical Engineering, 2014
This paper presents an innovative method for measuring the time delay of ultrasonic waves. Pulse methods used in the previous studies was characterized by latency. The method of phase correlation, presented in this article is free from this disadvantages.
Gądek K., Jaraczewski M.
doaj   +1 more source

Home - About - Disclaimer - Privacy