Results 41 to 50 of about 319,627 (296)

Research on efficient cross trust-domain group authentication with conditional privacy of vehicle platoon under blockchian architecture

open access: yesTongxin xuebao, 2023
In order to balance the security and efficiency of vehicle platoon cross trust-domain identity authentication, an efficient cross trust-domain group authentication scheme with conditional privacy of vehicle platoon under blockchian architecture was ...
Yingjie XIA, Siyu ZHU, Xuejiao LIU
doaj   +2 more sources

Organoids in pediatric cancer research

open access: yesFEBS Letters, EarlyView.
Organoid technology has revolutionized cancer research, yet its application in pediatric oncology remains limited. Recent advances have enabled the development of pediatric tumor organoids, offering new insights into disease biology, treatment response, and interactions with the tumor microenvironment.
Carla Ríos Arceo, Jarno Drost
wiley   +1 more source

ToAM: a task-oriented authentication model for UAVs based on blockchain

open access: yesEURASIP Journal on Wireless Communications and Networking, 2021
The pervasive cooperation of a group of UAVs has attracted increasing attention due to the reduced cost and widespread availability. When working in an untrusted or adversarial environment, the mutual authentication of UAVs in the cooperative process is ...
Aiguo Chen   +5 more
doaj   +1 more source

Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices

open access: yesIEEE Internet of Things Journal, 2019
Device authentication is an essential security feature for Internet of Things (IoT). Many IoT devices are deployed in the open and public places, which makes them vulnerable to physical and cloning attacks. Therefore, any authentication protocol designed
P. Gope, B. Sikdar
semanticscholar   +1 more source

CCT4 promotes tunneling nanotube formation

open access: yesFEBS Letters, EarlyView.
Tunneling nanotubes (TNTs) are membranous tunnel‐like structures that transport molecules and organelles between cells. They vary in thickness, and thick nanotubes often contain microtubules in addition to actin fibers. We found that cells expressing monomeric CCT4 generate many thick TNTs with tubulin.
Miyu Enomoto   +3 more
wiley   +1 more source

A Secure and Decentralized Authentication Mechanism Based on Web 3.0 and Ethereum Blockchain Technology

open access: yesApplied Sciences, 2023
Over the past decade, there has been significant evolution in the security field, specifically in the authentication and authorization part. The standard authentication protocol nowadays is OAuth 2.0-based authentication.
Adrian Petcu   +3 more
doaj   +1 more source

Vacuolar transport and function of Saccharomyces cerevisiae sterol ester hydrolase Tgl1

open access: yesFEBS Letters, EarlyView.
Tgl1, one of yeast sterol ester hydrolases, had been found on the lipid droplets where sterol esters are mainly stored. This study revealed that Tgl1 is transported into the vacuole depending on the ESCRT‐I–III complex, and that it exhibits intra‐vacuolar sterol ester hydrolase activity.
Takumi Nakatsuji   +5 more
wiley   +1 more source

Efficient authentication scheme for cross-trust domain of IoV based on double-layer shard blockchain

open access: yesTongxin xuebao, 2023
To solve the problems of poor scalability, slow synchronization of authentication information, and high authentication overhead in cross-trust domain message authentication in the Internet of vehicles (IoV), an efficient authentication scheme for cross ...
Xuejiao LIU, Qiang ZHONG, Yingjie XIA
doaj   +2 more sources

Comparative Analysis of LC-ESI-IM-qToF-MS and FT-NIR Spectroscopy Approaches for the Authentication of Organic and Conventional Eggs [PDF]

open access: gold, 2023
Henri Lösel   +6 more
openalex   +1 more source

Behavioral Biometrics for Continuous Authentication in the Internet-of-Things Era: An Artificial Intelligence Perspective

open access: yesIEEE Internet of Things Journal, 2020
In the Internet-of-Things (IoT) era, user authentication is essential to ensure the security of connected devices and the customization of passive services. However, conventional knowledge-based and physiological biometric-based authentication systems (e.
Yunji Liang   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy