Results 51 to 60 of about 118,033 (317)
In order to balance the security and efficiency of vehicle platoon cross trust-domain identity authentication, an efficient cross trust-domain group authentication scheme with conditional privacy of vehicle platoon under blockchian architecture was ...
Yingjie XIA, Siyu ZHU, Xuejiao LIU
doaj +2 more sources
Efficient authentication scheme for cross-trust domain of IoV based on double-layer shard blockchain
To solve the problems of poor scalability, slow synchronization of authentication information, and high authentication overhead in cross-trust domain message authentication in the Internet of vehicles (IoV), an efficient authentication scheme for cross ...
Xuejiao LIU, Qiang ZHONG, Yingjie XIA
doaj +2 more sources
Over the past decade, there has been significant evolution in the security field, specifically in the authentication and authorization part. The standard authentication protocol nowadays is OAuth 2.0-based authentication.
Adrian Petcu+3 more
doaj +1 more source
Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication [PDF]
Public key authentication (PKA) has been deployed in various services to provide stronger authentication to users. In PKA, a user manages private keys on her devices called authenticators, and services bind the corresponding public keys to her account. To protect private keys, a user uses authenticators which never export private keys outside.
arxiv
Surfaceome: a new era in the discovery of immune evasion mechanisms of circulating tumor cells
In the era of immunotherapies, many patients either do not respond or eventually develop resistance. We propose to pave the way for proteomic analysis of surface‐expressed proteins called surfaceome, of circulating tumor cells. This approach seeks to identify immune evasion mechanisms and discover potential therapeutic targets. Circulating tumor cells (
Doryan Masmoudi+3 more
wiley +1 more source
Keyless Authentication and Authenticated Capacity
We consider the problem of keyless message authentication over noisy channels in the presence of an active adversary. Different from the existing models, in our model, the legitimate users do not have any pre-shared key for authentication. Instead, we use the noisy channel connecting the legitimate users for authentication.
Wenwen Tu, Lifeng Lai
openaire +2 more sources
A comparative study of circulating tumor cell isolation and enumeration technologies in lung cancer
Lung cancer cells were spiked into donor blood to evaluate the recovery rates of the following circulating tumor cell (CTC) enrichment technologies: CellMag™, EasySep™, RosetteSep™, Parsortix® PR1, and Parsortix® Prototype systems. Each method's advantages and disadvantages are described.
Volga M Saini+11 more
wiley +1 more source
ToAM: a task-oriented authentication model for UAVs based on blockchain
The pervasive cooperation of a group of UAVs has attracted increasing attention due to the reduced cost and widespread availability. When working in an untrusted or adversarial environment, the mutual authentication of UAVs in the cooperative process is ...
Aiguo Chen+5 more
doaj +1 more source
Cell‐free and extracellular vesicle microRNAs with clinical utility for solid tumors
Cell‐free microRNAs (cfmiRs) are small‐RNA circulating molecules detectable in almost all body biofluids. Innovative technologies have improved the application of cfmiRs to oncology, with a focus on clinical needs for different solid tumors, but with emphasis on diagnosis, prognosis, cancer recurrence, as well as treatment monitoring.
Yoshinori Hayashi+6 more
wiley +1 more source
Synthesis and Characterization of Nano-crystalline ZSM-5 Zeolite
Nano-crystalline ZSM-5 zeolite was synthesized by hydrothermal method using chelating agent and two gel compositions:Compositionɪ:Al2O3:86SiO2:5.5TPA:12.7Na2O:3.4Trien:3320H2O.Compositionɪɪ:Al2O3:68SiO2:5.4TPA:10Na2O:2.6Trien:2626H2O.Study of ...
Najwa Saber Majeed+1 more
doaj +2 more sources