Results 41 to 50 of about 80,103 (295)

The Urgency of identity verification and safeguarding personal information during online transactions

open access: yesLaw and Justice
The complexity of law enforcement in online trading fraud cases poses significant challenges. Sellers can carry out fraudulent activities through product counterfeiting or making transactions outside of e-commerce platforms, while buyers can commit fraud
Anton Satila   +4 more
doaj   +1 more source

Why human connection is the true metric of research success

open access: yesFEBS Open Bio, EarlyView.
Human‐centred mentorship can be shaped by mentor attributes, actions, intrinsic drive and career ambition. Drawing on reflections across Singapore and France, as well as workshop insights from FEBS‐IUBMB ENABLE 2024, this article shows that human‐centred mentorship creates the conditions for sustainable growth, well‐being and retention in research ...
Timothy Lin Yun Tan   +3 more
wiley   +1 more source

DNA barcoding as a molecular tool to track down mislabeling and food piracy [PDF]

open access: yes, 2015
DNA barcoding is a molecular technology that allows the identification of any biological species by amplifying, sequencing and querying the information from genic and/or intergenic standardized target regions belonging to the extranuclear genomes ...
Barcaccia, Gianni   +2 more
core   +2 more sources

Qualified Electronic Signature – eIDAS Striking Czech Public Sector Bodies

open access: yesActa Universitatis Agriculturae et Silviculturae Mendelianae Brunensis, 2019
Electronic IDentification, Authentication and trust Services (“eIDAS”) is a standardized system for trustworthiness, effectiveness and efficiency. Since 2018, Czech public sector bodies have to use qualified electronic signatures when officially acting ...
Radka MacGregor Pelikánová   +2 more
doaj   +1 more source

A new security architecture for SIP based P2P computer networks [PDF]

open access: yes, 2008
Many applications are transferred from C/S (Client/Server) mode to P2P (Peer-to-Peer) mode such as VoIP (Voice over IP). This paper presents a new security architecture, i.e.
Tang, S, Yip, YJ, Yongfeng, H
core  

Restoration of missing lines in grip patterns for biometrics authentication on a smart gun [PDF]

open access: yes, 2006
The Secure Grip project1 aims to develop a grip-pattern recognition system, as part of a smart gun. Its target users are the police officers. The current authentication algorithm is based on a likelihood-ratio classifier.
Ganzevoort, W.P.T.   +3 more
core   +6 more sources

Built‐In Interfacial Electric Field in Hydroxyl‐Terminated MXene/COF Heterostructures for Enhanced Solid‐State Supercapacitors

open access: yesAdvanced Functional Materials, EarlyView.
Hydroxyl‐terminated MXene is integrated with a redox‐active covalent organic framework through electrostatic self‐assembly followed by hydrothermal treatment to construct MXene/COF heterostructures with a built‐in interfacial electric field. Termination‐controlled interfacial electronic modulation induces charge redistribution and favorable band ...
Cheru Fekadu Molla   +4 more
wiley   +1 more source

Face Off: An Examination of State Biometric Privacy Statutes & Data Harm Remedies [PDF]

open access: yes, 2019
As biometric authentication becomes an increasingly popular method of security among consumers, only three states currently have statutes detailing how such data may be collected, used, retained, and released.
Rivera, Michael A.
core   +1 more source

Polymer Interface Enables Reversible Quasi‐Solid Sulfur Conversion in Sodium‐Sulfur Batteries

open access: yesAdvanced Functional Materials, EarlyView.
The polymer interface enables a stable quasi‐solid sulfur conversion pathway in room‐temperature Na─S batteries. The coating regulates Na+ transport, stabilizes the cathode–electrolyte interphase, and accommodates mechanical stress, suppressing electrolyte decomposition and sulfur migration, thereby improving reaction uniformity, reducing polarization,
Reza Andaveh   +12 more
wiley   +1 more source

Intellectual Coherence in an Evidence Code [PDF]

open access: yes, 1995
The Federal Rules of Evidence (Federal Rules or Rules) were created in large part to promote uniformity and predictability in federal trials by providing a relatively instructive guide for judges and lawyers concerning the admissibility of evidence.
Rothstein, Paul F
core   +2 more sources

Home - About - Disclaimer - Privacy