Results 41 to 50 of about 420,085 (316)

A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure

open access: yesFuture Internet, 2023
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing.
Soumya Prakash Otta   +3 more
doaj   +1 more source

A Cre‐dependent lentiviral vector for neuron subtype‐specific expression of large proteins

open access: yesFEBS Letters, EarlyView.
We designed a versatile and modular lentivector comprising a Cre‐dependent switch and self‐cleaving 2A peptide and tested it for co‐expression of GFP and a 2.8 kb gene of interest (GOI) in mouse cortical parvalbumin (PV+) interneurons and midbrain dopamine (TH+) neurons.
Weixuan Xue   +6 more
wiley   +1 more source

Hematopoietic (stem) cells—The elixir of life?

open access: yesFEBS Letters, EarlyView.
The aging of HSCs (hematopoietic stem cells) and the blood system leads to the decline of other organs. Rejuvenating aged HSCs improves the function of the blood system, slowing the aging of the heart, kidney, brain, and liver, and the occurrence of age‐related diseases.
Emilie L. Cerezo   +4 more
wiley   +1 more source

Design and Implementation of an IP based authentication mechanism for Open Source Proxy Servers in Interception Mode

open access: yes, 2013
Proxy servers are being increasingly deployed at organizations for performance benefits; however, there still exists drawbacks in ease of client authentication in interception proxy mode mainly for Open Source Proxy Servers.
Agarwal, Tejaswi, Leonetti, Mike A.
core   +1 more source

Phosphatidylinositol 4‐kinase as a target of pathogens—friend or foe?

open access: yesFEBS Letters, EarlyView.
This graphical summary illustrates the roles of phosphatidylinositol 4‐kinases (PI4Ks). PI4Ks regulate key cellular processes and can be hijacked by pathogens, such as viruses, bacteria and parasites, to support their intracellular replication. Their dual role as essential host enzymes and pathogen cofactors makes them promising drug targets.
Ana C. Mendes   +3 more
wiley   +1 more source

Attacks on quantum key distribution protocols that employ non-ITS authentication

open access: yes, 2015
We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously.
A Abidin   +25 more
core   +1 more source

Whither Authenticity?

open access: yesThe American Journal of Bioethics, 2005
The discipline of Bioethics, being the amalgam that it is, features myriad concepts, theories, and approaches. Singh adds another dimension to the field, with her sensitive and penetrating investigation into parents' perceptions of Ritalin use. One concept Singh uses in her analysis is that of authenticity.
Newson, A.J., Ashcroft, R E
openaire   +3 more sources

The role and implications of mammalian cellular circadian entrainment

open access: yesFEBS Letters, EarlyView.
At their most fundamental level, mammalian circadian rhythms occur inside every individual cell. To tell the correct time, cells must align (or ‘entrain’) their circadian rhythm to the external environment. In this review, we highlight how cells entrain to the major circadian cues of light, feeding and temperature, and the implications this has for our
Priya Crosby
wiley   +1 more source

Preparation of microencapsulated NH4H2PO4 solution and flame suppression of lithium battery thermal runaway

open access: yesCase Studies in Thermal Engineering
This study addresses the bottleneck issue of insufficient functionality of traditional extinguishing agents in the fire prevention and control of lithium batteries in new energy vehicles.
Yang Liping   +8 more
doaj   +1 more source

Rethinking Authentication [PDF]

open access: yesIT Professional, 2019
DONE? & IN TODAY’S ENVIRONMENT, there is little doubt that companies, organizations, and governments must make significant investments in developing, implementing, and supporting authentication for their digital systems. Perhaps because of this, an organization’s IT support center often takes a hard line when it comes to user’s authentication ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy