Results 211 to 220 of about 420,085 (316)
A secure multi phase authentication protocol for cloud infrastructure using elliptic curve cryptography. [PDF]
Sivasankar R, Marikkannan M.
europepmc +1 more source
What factors make for an effective digital learning tool in Higher Education? This systematic review identifies elements of a digital tool that published examples reveal to be features of an engaging and impactful digital tool. A systematic literature search yielded 25 research papers for analysis.
Akmal Arzeman +4 more
wiley +1 more source
Secure facial biometric authentication in smart cities using multimodal methodology. [PDF]
Sureshkumar A +4 more
europepmc +1 more source
This research protocol outlines a workflow for nuclear magnetic resonance (NMR)‐based metabolomics in the agri‐food sector. Using two case studies—strawberry leaves (solid matrix) and wine (liquid matrix)—it details the procedures for sample preparation, data acquisition, and processing.
Andrea Fernández‐Veloso +4 more
wiley +1 more source
Anonymous and Efficient Chaotic Map-Based Authentication Protocol for Industrial Internet of Things. [PDF]
Zeng D +6 more
europepmc +1 more source
Dataset for authentication and authorization using physical layer properties in indoor environment
Kazi Istiaque Ahmed +5 more
openalex +1 more source
Securing UAV Flying Ad Hoc Wireless Networks: Authentication Development for Robust Communications [PDF]
Muhammet A. Sen +2 more
openalex +1 more source
We found that during chemotherapy‐induced alopecia (CIA), Sonic hedgehog (Shh) expression significantly decreased in hair follicle Shh+ cells, whereas the Janus‐activated kinase/signal transducer and activator of transcription 1 (JAK/STAT1) signaling pathway was markedly activated.
Ruifang Fan +6 more
wiley +1 more source
Integrated Authentication Server Design for Efficient Kerberos-Blockchain VANET Authentication. [PDF]
Rahayu M, Hossain MB, Huda S, Nogami Y.
europepmc +1 more source

