Results 61 to 70 of about 420,085 (316)

Quantification and Classification of Corn and Sunflower Oils as Adulterants in Olive Oil Using Chemometrics and FTIR Spectra

open access: yesThe Scientific World Journal, 2012
Commercially, extra virgin olive oil (EVOO) is subjected to be adulterated with low-price oils having similar color to EVOO. Fourier transform infrared (FTIR) spectroscopy combined with chemometrics has been successfully used for classification and ...
Abdul Rohman, Y. B. Che Man
doaj   +1 more source

Fuzzy Authentication using Rank Distance

open access: yes, 2017
Fuzzy authentication allows authentication based on the fuzzy matching of two objects, for example based on the similarity of two strings in the Hamming metric, or on the similiarity of two sets in the set difference metric.
A Cossidente   +8 more
core   +1 more source

Time after time – circadian clocks through the lens of oscillator theory

open access: yesFEBS Letters, EarlyView.
Oscillator theory bridges physics and circadian biology. Damped oscillators require external drivers, while limit cycles emerge from delayed feedback and nonlinearities. Coupling enables tissue‐level coherence, and entrainment aligns internal clocks with environmental cues.
Marta del Olmo   +2 more
wiley   +1 more source

Gathering realistic authentication performance data through field trials [PDF]

open access: yes, 2010
Most evaluations of novel authentication mechanisms have been conducted under laboratory conditions. We argue that the results of short-term usage under laboratory conditions do not predict user performance “in the wild”, because there is insufficient ...
Beautement, A, Sasse, MA
core   +1 more source

Information Theoretic Authentication and Secrecy Codes in the Splitting Model

open access: yes, 2011
In the splitting model, information theoretic authentication codes allow non-deterministic encoding, that is, several messages can be used to communicate a particular plaintext.
Huber, Michael
core   +1 more source

Multiple ETS family transcription factors bind mutant p53 via distinct interaction regions

open access: yesFEBS Letters, EarlyView.
Mutant p53 gain‐of‐function is thought to be mediated by interaction with other transcription factors. We identify multiple ETS transcription factors that can bind mutant p53 and found that this interaction can be promoted by a PXXPP motif. ETS proteins that strongly bound mutant p53 were upregulated in ovarian cancer compared to ETS proteins that ...
Stephanie A. Metcalf   +6 more
wiley   +1 more source

ToAM: a task-oriented authentication model for UAVs based on blockchain

open access: yesEURASIP Journal on Wireless Communications and Networking, 2021
The pervasive cooperation of a group of UAVs has attracted increasing attention due to the reduced cost and widespread availability. When working in an untrusted or adversarial environment, the mutual authentication of UAVs in the cooperative process is ...
Aiguo Chen   +5 more
doaj   +1 more source

Authentication and authenticated key exchanges [PDF]

open access: yesDesigns, Codes and Cryptography, 1992
We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing on those using asymmetric techniques. A simple, efficient protocol referred to as the station-to-station (STS) protocol is introduced, examined in detail, and considered in relation to existing protocols. The definition of a secure protocol is considered,
Whitfield Diffie   +2 more
openaire   +1 more source

The newfound relationship between extrachromosomal DNAs and excised signal circles

open access: yesFEBS Letters, EarlyView.
Extrachromosomal DNAs (ecDNAs) contribute to the progression of many human cancers. In addition, circular DNA by‐products of V(D)J recombination, excised signal circles (ESCs), have roles in cancer progression but have largely been overlooked. In this Review, we explore the roles of ecDNAs and ESCs in cancer development, and highlight why these ...
Dylan Casey, Zeqian Gao, Joan Boyes
wiley   +1 more source

Research on efficient cross trust-domain group authentication with conditional privacy of vehicle platoon under blockchian architecture

open access: yesTongxin xuebao, 2023
In order to balance the security and efficiency of vehicle platoon cross trust-domain identity authentication, an efficient cross trust-domain group authentication scheme with conditional privacy of vehicle platoon under blockchian architecture was ...
Yingjie XIA, Siyu ZHU, Xuejiao LIU
doaj   +2 more sources

Home - About - Disclaimer - Privacy