Results 21 to 30 of about 355,842 (292)
Distributed and efficient identity authentication based on consortium blockchain
In order to solve the problems of cumbersome user authentication process, insecure identity information, and vulnerability of authentication system in traditional identity authentication, a distributed identity authentication method based on alliance ...
Yao Ying +4 more
doaj +1 more source
Algorithm design for grip-pattern verification in smart gun [PDF]
The Secure Grip project1 focuses on the development of a hand-grip pattern recognition system, as part of the smart gun. Its target customer is the police. To explore the authentication performance of this system, we collected data from a group of police
Bazen, A.M. +3 more
core +8 more sources
The downregulation of NCXs is positively correlated with the prognosis of stage II–IV colon cancer
Purpose Colon cancer (CC) is a very common gastrointestinal tumor that is prone to invasion and metastasis in the late stage. This study aims to observe the expression of Na+/Ca2+ exchangers (NCXs) and analyze the correlation between NCXs and the ...
Zhixiu Xia, Changliang Wang, Hong Zhang
doaj +1 more source
Impact of Globalisation on Data Security – Authentication Issues [PDF]
Research background: In today’s globalised world, there is an increasing need for reliable verification of users’ identity accessing various types of information systems.
Hub Miloslav +1 more
doaj +1 more source
Comprehensive Analysis of Rhodomyrtus tomentosa Chloroplast Genome
In the last decade, several studies have relied on a small number of plastid genomes to deduce deep phylogenetic relationships in the species-rich Myrtaceae.
Yuying Huang +5 more
doaj +1 more source
Transparent code authentication at the processor level [PDF]
The authors present a lightweight authentication mechanism that verifies the authenticity of code and thereby addresses the virus and malicious code problems at the hardware level eliminating the need for trusted extensions in the operating system.
A.O. Durahim +32 more
core +2 more sources
Questioning Authenticity [PDF]
Authenticity is an important category in cultural debates, which has emerged in parallel with the notion of modernity. Authenticity refers to the idea that something is “real” or “true,” that its outer appearance is in correspondence with its inner being, in contrast with things that are “fake” or “false” or “dissimulating.” Although the term thus ...
openaire +2 more sources
Background The DNA metabarcoding approach has become one of the most used techniques to study the taxa composition of various sample types. To deal with the high amount of data generated by the high-throughput sequencing process, a bioinformatics ...
Benjamin Dubois +7 more
doaj +1 more source
GazeTouchPass: Multimodal Authentication Using Gaze and Touch on Mobile Devices [PDF]
We propose a multimodal scheme, GazeTouchPass, that combines gaze and touch for shoulder-surfing resistant user authentication on mobile devices. GazeTouchPass allows passwords with multiple switches between input modalities during authentication.
Alt, Florian +5 more
core +1 more source
A Novel Cross-Layer Authentication Protocol for the Internet of Things
An innovative cross-layer authentication protocol that integrates cryptography-based authentication and physical layer authentication (PLA) is proposed for massive cellular Internet of things (IoT) systems.
Yonggu Lee +3 more
doaj +1 more source

