Results 41 to 50 of about 319,627 (296)
In order to balance the security and efficiency of vehicle platoon cross trust-domain identity authentication, an efficient cross trust-domain group authentication scheme with conditional privacy of vehicle platoon under blockchian architecture was ...
Yingjie XIA, Siyu ZHU, Xuejiao LIU
doaj +2 more sources
Organoids in pediatric cancer research
Organoid technology has revolutionized cancer research, yet its application in pediatric oncology remains limited. Recent advances have enabled the development of pediatric tumor organoids, offering new insights into disease biology, treatment response, and interactions with the tumor microenvironment.
Carla Ríos Arceo, Jarno Drost
wiley +1 more source
ToAM: a task-oriented authentication model for UAVs based on blockchain
The pervasive cooperation of a group of UAVs has attracted increasing attention due to the reduced cost and widespread availability. When working in an untrusted or adversarial environment, the mutual authentication of UAVs in the cooperative process is ...
Aiguo Chen +5 more
doaj +1 more source
Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices
Device authentication is an essential security feature for Internet of Things (IoT). Many IoT devices are deployed in the open and public places, which makes them vulnerable to physical and cloning attacks. Therefore, any authentication protocol designed
P. Gope, B. Sikdar
semanticscholar +1 more source
CCT4 promotes tunneling nanotube formation
Tunneling nanotubes (TNTs) are membranous tunnel‐like structures that transport molecules and organelles between cells. They vary in thickness, and thick nanotubes often contain microtubules in addition to actin fibers. We found that cells expressing monomeric CCT4 generate many thick TNTs with tubulin.
Miyu Enomoto +3 more
wiley +1 more source
Over the past decade, there has been significant evolution in the security field, specifically in the authentication and authorization part. The standard authentication protocol nowadays is OAuth 2.0-based authentication.
Adrian Petcu +3 more
doaj +1 more source
Vacuolar transport and function of Saccharomyces cerevisiae sterol ester hydrolase Tgl1
Tgl1, one of yeast sterol ester hydrolases, had been found on the lipid droplets where sterol esters are mainly stored. This study revealed that Tgl1 is transported into the vacuole depending on the ESCRT‐I–III complex, and that it exhibits intra‐vacuolar sterol ester hydrolase activity.
Takumi Nakatsuji +5 more
wiley +1 more source
Efficient authentication scheme for cross-trust domain of IoV based on double-layer shard blockchain
To solve the problems of poor scalability, slow synchronization of authentication information, and high authentication overhead in cross-trust domain message authentication in the Internet of vehicles (IoV), an efficient authentication scheme for cross ...
Xuejiao LIU, Qiang ZHONG, Yingjie XIA
doaj +2 more sources
Comparative Analysis of LC-ESI-IM-qToF-MS and FT-NIR Spectroscopy Approaches for the Authentication of Organic and Conventional Eggs [PDF]
Henri Lösel +6 more
openalex +1 more source
In the Internet-of-Things (IoT) era, user authentication is essential to ensure the security of connected devices and the customization of passive services. However, conventional knowledge-based and physiological biometric-based authentication systems (e.
Yunji Liang +3 more
semanticscholar +1 more source

