Results 21 to 30 of about 118,033 (317)
Traditional use, phytochemistry and pharmacology of Viticis Fructus
Ethnopharmacological relevance: Viticis Fructus (called Manjingzi in China) is the dried ripe fruits of the plant species Vitex trifolia subsp. litoralis Steenis and Vitex trifolia L. in the family Lamiaceae.
Xiangqing Meng+8 more
doaj
Authenticity, authentication and experiential authenticity: telling stories in museums [PDF]
This article examines how different types of authenticity and authentication work together to inspire museum stories, and personal identification with them, in ways that encourage experiential authenticity. It begins by outlining conceptions of object and existential authenticity and demonstrating how they are bound up with processes of hot and cool ...
openaire +2 more sources
Lycium chinense Mill, an important Chinese herbal medicine, is widely used as a dietary supplement and food. Here the chloroplast (CP) genome of L. chinense was sequenced and analyzed, revealing a size of 155,756 bp and with a 37.8% GC content.
Zerui Yang+5 more
doaj +1 more source
Comprehensive Analysis of Rhodomyrtus tomentosa Chloroplast Genome
In the last decade, several studies have relied on a small number of plastid genomes to deduce deep phylogenetic relationships in the species-rich Myrtaceae.
Yuying Huang+5 more
doaj +1 more source
Secure communication requires message authentication. In this paper we address the problem of how to authenticate quantum information sent through a quantum channel between two communicating parties with the minimum amount of resources. Specifically, our objective is to determine whether one elementary quantum message (a qubit) can be authenticated ...
Marcos Curty+3 more
openaire +3 more sources
A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing.
Soumya Prakash Otta+3 more
doaj +1 more source
State authenticity is the sense that one is currently in alignment with one’s true or real self. We discuss state authenticity as seen by independent raters, describe its phenomenology, outline its triggers, consider its well-being and behavioral implications, and sketch out a cross-disciplinary research agenda.
Sedikides, Constantine+3 more
openaire +3 more sources
A Novel Cross-Layer Authentication Protocol for the Internet of Things
An innovative cross-layer authentication protocol that integrates cryptography-based authentication and physical layer authentication (PLA) is proposed for massive cellular Internet of things (IoT) systems.
Yonggu Lee+3 more
doaj +1 more source
To be or Not to be Authentic. In Defence of Authenticity as an Ethical Ideal [PDF]
It has recently been pointed out that the cloudiness of the concept of authenticity as well as inflated ideologies of the 'true self' provide good reasons to criticize theories and ideals of authenticity. Nevertheless, there are also good reasons to defend an ethical ideal of authenticity, not least because of its critical and oppositional force, which
openaire +2 more sources
Questioning Authenticity [PDF]
Authenticity is an important category in cultural debates, which has emerged in parallel with the notion of modernity. Authenticity refers to the idea that something is “real” or “true,” that its outer appearance is in correspondence with its inner being, in contrast with things that are “fake” or “false” or “dissimulating.” Although the term thus ...
openaire +2 more sources