Results 21 to 30 of about 420,085 (316)
Impact of Globalisation on Data Security – Authentication Issues [PDF]
Research background: In today’s globalised world, there is an increasing need for reliable verification of users’ identity accessing various types of information systems.
Hub Miloslav +1 more
doaj +1 more source
The downregulation of NCXs is positively correlated with the prognosis of stage II–IV colon cancer
Purpose Colon cancer (CC) is a very common gastrointestinal tumor that is prone to invasion and metastasis in the late stage. This study aims to observe the expression of Na+/Ca2+ exchangers (NCXs) and analyze the correlation between NCXs and the ...
Zhixiu Xia, Changliang Wang, Hong Zhang
doaj +1 more source
Comprehensive Analysis of Rhodomyrtus tomentosa Chloroplast Genome
In the last decade, several studies have relied on a small number of plastid genomes to deduce deep phylogenetic relationships in the species-rich Myrtaceae.
Yuying Huang +5 more
doaj +1 more source
Background The DNA metabarcoding approach has become one of the most used techniques to study the taxa composition of various sample types. To deal with the high amount of data generated by the high-throughput sequencing process, a bioinformatics ...
Benjamin Dubois +7 more
doaj +1 more source
They Are All After You: Investigating the Viability of a Threat Model That Involves Multiple Shoulder Surfers [PDF]
Many of the authentication schemes for mobile devices that were proposed lately complicate shoulder surfing by splitting the attacker's attention into two or more entities.
Alt, Florian +5 more
core +1 more source
Questioning Authenticity [PDF]
Authenticity is an important category in cultural debates, which has emerged in parallel with the notion of modernity. Authenticity refers to the idea that something is “real” or “true,” that its outer appearance is in correspondence with its inner being, in contrast with things that are “fake” or “false” or “dissimulating.” Although the term thus ...
openaire +2 more sources
A Novel Cross-Layer Authentication Protocol for the Internet of Things
An innovative cross-layer authentication protocol that integrates cryptography-based authentication and physical layer authentication (PLA) is proposed for massive cellular Internet of things (IoT) systems.
Yonggu Lee +3 more
doaj +1 more source
Using semantics for automating the authentication of Web APIs [PDF]
Recent technology developments in the area of services on the Web are marked by the proliferation of Web applications and APIs. The implementation and evolution of applications based on Web APIs is, however, hampered by the lack of automation that can be
Alvaro, Guillermo +4 more
core +3 more sources
Offline User Authentication Ensuring Non-Repudiation and Anonymity
User authentication is the key to ensuring that only authorized users can deal with specific affairs and access services. Applications or systems possessing different properties or requirements need different authentication schemes.
Ya-Fen Chang, Wei-Liang Tai, Ka-Ho Fung
doaj +1 more source
A Testbed for Developing and Evaluating GNSS Signal Authentication Techniques [PDF]
An experimental testbed has been created for developing and evaluating Global Navigation Satellite System (GNSS) signal authentication techniques.
Bhatti, Jahshan A. +3 more
core +1 more source

