Results 101 to 110 of about 3,158,126 (357)

Application of public key infrastructure in telecom operators

open access: yesDianxin kexue, 2020
With the implementation of cryptography law,the application of cryptography in information system in China has been promoted to the legal level,which requires the application of public key infrastructure in the mutual trust of network entities to be ...
Congli WANG, Jinhua WANG, Weijia XUE
doaj   +2 more sources

Counterintuitive Fluorescence Blue Shift in Symmetry Breaking Dicationic Bis(indolium) with Two‐Photon Absorption Properties for NIR Living Cell Imaging

open access: yesAdvanced Materials, EarlyView.
Highly water‐soluble dicationic bis(indolium) dyes have been prepared, showing excellent two‐photon absorption and light emission. Their fluorescence behavior discloses an unusual increasing blue shift with increasing solvent polarity, which, in parallel, is beneficial for enhanced detection in biological media.
Carlos Benitez‐Martin   +5 more
wiley   +1 more source

Challenges of Multi-Factor Authentication for Securing Advanced IoT (A-IoT) Applications

open access: yes, 2019
The unprecedented proliferation of smart devices together with novel communication, computing, and control technologies have paved the way for the Advanced Internet of Things~(A-IoT).
Andreev, Sergey   +5 more
core   +1 more source

Microscopic Insights into Magnetic Warping and Time‐Reversal Symmetry Breaking in Topological Surface States of Rare‐Earth‐Doped Bi2Te3

open access: yesAdvanced Materials, EarlyView.
Magnetic doping of the topological insulator Bi2Te3 with erbium adatoms induces out‐of‐plane magnetism and breaks time‐reversal symmetry, opening a Dirac gap and driving a Fermi surface transition from hexagonal to star‐of‐David geometry. Microscopy, spectroscopy, and magnetic dichroism reveal atomically controlled magnetic interactions that tailor the
Beatriz Muñiz Cano   +18 more
wiley   +1 more source

Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network

open access: yesEmitter: International Journal of Engineering Technology, 2016
MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile,
Samsul Huda   +2 more
doaj   +3 more sources

FINGERPRINT MATCHING BASED ON PORE CENTROIDS [PDF]

open access: yesICTACT Journal on Image and Video Processing, 2011
In recent years there has been exponential growth in the use of bio- metrics for user authentication applications. Automated Fingerprint Identification systems have become popular tool in many security and law enforcement applications.
S. Malathi, C. Meena
doaj  

Universal Conductance Fluctuations in Quantum Anomalous Hall Insulators

open access: yesAdvanced Materials, EarlyView.
Universal conductance fluctuations are observed in mesoscopic quantum anomalous Hall insulators. Two distinct fluctuation patterns are identified, arising from different interference processes of bulk and chiral edge states, respectively. These findings unveil rich quantum interference phenomena in quantum anomalous Hall insulators and provide insights
Peng Deng   +11 more
wiley   +1 more source

Medical Malpractice: A Comparative Perspective Between China and the United States

open access: yesContemporary Social Sciences, 2020
At the beginning of the 1970s, the United States turned onto the winding road of medical malpractice compensation. With the goal of properly dealing with this issue, the United States embarked on a process of continuous reform.
Wang Yihan and Wang Zhu
doaj   +1 more source

The Second Circuit and the Federal Rules of Evidence [PDF]

open access: yes, 1977
The most significant development in federal trial procedure in recent years has been the enactment of the Federal Rules of Evidence, effective July 1, 1975.
Rothstein, Paul F
core   +1 more source

Real-time polymerase chain reaction for identification of dog meat in adulterated beef meatball using specific primer targeting on cytochrome-b for halal authentication

open access: yes, 2020
This research aimed to validate real-time polymerase chain reaction using specific primer targeting on cytochrome-b 33 (cyt-b 33). The primer cyt-b 33 could specifically amplify dog meat DNA and method could detect 0.5 pg dog meat DNA in meatball ...
A. Rohman   +6 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy