Results 21 to 30 of about 355,842 (292)

Distributed and efficient identity authentication based on consortium blockchain

open access: yesDianzi Jishu Yingyong, 2022
In order to solve the problems of cumbersome user authentication process, insecure identity information, and vulnerability of authentication system in traditional identity authentication, a distributed identity authentication method based on alliance ...
Yao Ying   +4 more
doaj   +1 more source

Algorithm design for grip-pattern verification in smart gun [PDF]

open access: yes, 2005
The Secure Grip project1 focuses on the development of a hand-grip pattern recognition system, as part of the smart gun. Its target customer is the police. To explore the authentication performance of this system, we collected data from a group of police
Bazen, A.M.   +3 more
core   +8 more sources

The downregulation of NCXs is positively correlated with the prognosis of stage II–IV colon cancer

open access: yesWorld Journal of Surgical Oncology, 2021
Purpose Colon cancer (CC) is a very common gastrointestinal tumor that is prone to invasion and metastasis in the late stage. This study aims to observe the expression of Na+/Ca2+ exchangers (NCXs) and analyze the correlation between NCXs and the ...
Zhixiu Xia, Changliang Wang, Hong Zhang
doaj   +1 more source

Impact of Globalisation on Data Security – Authentication Issues [PDF]

open access: yesSHS Web of Conferences, 2021
Research background: In today’s globalised world, there is an increasing need for reliable verification of users’ identity accessing various types of information systems.
Hub Miloslav   +1 more
doaj   +1 more source

Comprehensive Analysis of Rhodomyrtus tomentosa Chloroplast Genome

open access: yesPlants, 2019
In the last decade, several studies have relied on a small number of plastid genomes to deduce deep phylogenetic relationships in the species-rich Myrtaceae.
Yuying Huang   +5 more
doaj   +1 more source

Transparent code authentication at the processor level [PDF]

open access: yes, 2009
The authors present a lightweight authentication mechanism that verifies the authenticity of code and thereby addresses the virus and malicious code problems at the hardware level eliminating the need for trusted extensions in the operating system.
A.O. Durahim   +32 more
core   +2 more sources

Questioning Authenticity [PDF]

open access: yesNational Identities, 2005
Authenticity is an important category in cultural debates, which has emerged in parallel with the notion of modernity. Authenticity refers to the idea that something is “real” or “true,” that its outer appearance is in correspondence with its inner being, in contrast with things that are “fake” or “false” or “dissimulating.” Although the term thus ...
openaire   +2 more sources

A detailed workflow to develop QIIME2-formatted reference databases for taxonomic analysis of DNA metabarcoding data

open access: yesBMC Genomic Data, 2022
Background The DNA metabarcoding approach has become one of the most used techniques to study the taxa composition of various sample types. To deal with the high amount of data generated by the high-throughput sequencing process, a bioinformatics ...
Benjamin Dubois   +7 more
doaj   +1 more source

GazeTouchPass: Multimodal Authentication Using Gaze and Touch on Mobile Devices [PDF]

open access: yes, 2016
We propose a multimodal scheme, GazeTouchPass, that combines gaze and touch for shoulder-surfing resistant user authentication on mobile devices. GazeTouchPass allows passwords with multiple switches between input modalities during authentication.
Alt, Florian   +5 more
core   +1 more source

A Novel Cross-Layer Authentication Protocol for the Internet of Things

open access: yesIEEE Access, 2020
An innovative cross-layer authentication protocol that integrates cryptography-based authentication and physical layer authentication (PLA) is proposed for massive cellular Internet of things (IoT) systems.
Yonggu Lee   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy