Results 11 to 20 of about 355,842 (292)
Authenticity and the ‘Authentic City’ [PDF]
In this paper, I argue that the benefits that smart cities purport to provide cohere poorly with a number of our shared phenomenological intuitions about the relationships(s) between authentic experience and technologised society. While many of these intuitions are, strictly speaking, pseudo-problems, they deserve our attention.
openaire +3 more sources
Design, Privacy and Authentication of Challenge Questions in Online Examinations [PDF]
Online examination is an essential part of the online learning and secure authentication is considered vital for the success of online learning. This study is part of an ongoing research on student authentication approaches and the use of challenge ...
Barker, Trevor +3 more
core +1 more source
Conceivable security risks and authentication techniques for smart devices [PDF]
With the rapidly escalating use of smart devices and fraudulent transaction of users’ data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligatory issue.
A. Arif +56 more
core +2 more sources
Seamless and Secure VR: Adapting and Evaluating Established Authentication Systems for Virtual Reality [PDF]
Virtual reality (VR) headsets are enabling a wide range of new opportunities for the user. For example, in the near future users may be able to visit virtual shopping malls and virtually join international conferences.
Alt, Florian +6 more
core +1 more source
Authenticity and The Authentic Enterprise [PDF]
Commentary on the Arthur W. Page Society's report, The Authentic Enterprise, and its conceptualisation of authenticity.
openaire +1 more source
Authenticity has long been a lynchpin of our thinking about heritage. It is a threshold question as to whether we even consider something to be heritage. Because authenticity is a threshold question, we have often assumed it and its relevance. Scholarship on authenticity therefore focuses on how it is created and (re)negotiated, seldom scrutinising the
openaire +2 more sources
Authentic Interpretation [PDF]
AbstractI approach the identification of the principles of legal interpretation through a discussion of an important but largely forgotten strand in our legal heritage: the idea (and at some points in English law, the rule) that the interpretation of legislation is to be done by the lawmaker.
openaire +2 more sources
State authenticity is the sense that one is currently in alignment with one’s true or real self. We discuss state authenticity as seen by independent raters, describe its phenomenology, outline its triggers, consider its well-being and behavioral implications, and sketch out a cross-disciplinary research agenda.
Sedikides, Constantine +3 more
openaire +3 more sources
The Case for Quantum Key Distribution [PDF]
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures.
A.R. Dixon +20 more
core +8 more sources
Lycium chinense Mill, an important Chinese herbal medicine, is widely used as a dietary supplement and food. Here the chloroplast (CP) genome of L. chinense was sequenced and analyzed, revealing a size of 155,756 bp and with a 37.8% GC content.
Zerui Yang +5 more
doaj +1 more source

