Results 41 to 50 of about 80,103 (295)
The complexity of law enforcement in online trading fraud cases poses significant challenges. Sellers can carry out fraudulent activities through product counterfeiting or making transactions outside of e-commerce platforms, while buyers can commit fraud
Anton Satila +4 more
doaj +1 more source
Why human connection is the true metric of research success
Human‐centred mentorship can be shaped by mentor attributes, actions, intrinsic drive and career ambition. Drawing on reflections across Singapore and France, as well as workshop insights from FEBS‐IUBMB ENABLE 2024, this article shows that human‐centred mentorship creates the conditions for sustainable growth, well‐being and retention in research ...
Timothy Lin Yun Tan +3 more
wiley +1 more source
DNA barcoding as a molecular tool to track down mislabeling and food piracy [PDF]
DNA barcoding is a molecular technology that allows the identification of any biological species by amplifying, sequencing and querying the information from genic and/or intergenic standardized target regions belonging to the extranuclear genomes ...
Barcaccia, Gianni +2 more
core +2 more sources
Qualified Electronic Signature – eIDAS Striking Czech Public Sector Bodies
Electronic IDentification, Authentication and trust Services (“eIDAS”) is a standardized system for trustworthiness, effectiveness and efficiency. Since 2018, Czech public sector bodies have to use qualified electronic signatures when officially acting ...
Radka MacGregor Pelikánová +2 more
doaj +1 more source
A new security architecture for SIP based P2P computer networks [PDF]
Many applications are transferred from C/S (Client/Server) mode to P2P (Peer-to-Peer) mode such as VoIP (Voice over IP). This paper presents a new security architecture, i.e.
Tang, S, Yip, YJ, Yongfeng, H
core
Restoration of missing lines in grip patterns for biometrics authentication on a smart gun [PDF]
The Secure Grip project1 aims to develop a grip-pattern recognition system, as part of a smart gun. Its target users are the police officers. The current authentication algorithm is based on a likelihood-ratio classifier.
Ganzevoort, W.P.T. +3 more
core +6 more sources
Hydroxyl‐terminated MXene is integrated with a redox‐active covalent organic framework through electrostatic self‐assembly followed by hydrothermal treatment to construct MXene/COF heterostructures with a built‐in interfacial electric field. Termination‐controlled interfacial electronic modulation induces charge redistribution and favorable band ...
Cheru Fekadu Molla +4 more
wiley +1 more source
Face Off: An Examination of State Biometric Privacy Statutes & Data Harm Remedies [PDF]
As biometric authentication becomes an increasingly popular method of security among consumers, only three states currently have statutes detailing how such data may be collected, used, retained, and released.
Rivera, Michael A.
core +1 more source
Polymer Interface Enables Reversible Quasi‐Solid Sulfur Conversion in Sodium‐Sulfur Batteries
The polymer interface enables a stable quasi‐solid sulfur conversion pathway in room‐temperature Na─S batteries. The coating regulates Na+ transport, stabilizes the cathode–electrolyte interphase, and accommodates mechanical stress, suppressing electrolyte decomposition and sulfur migration, thereby improving reaction uniformity, reducing polarization,
Reza Andaveh +12 more
wiley +1 more source
Intellectual Coherence in an Evidence Code [PDF]
The Federal Rules of Evidence (Federal Rules or Rules) were created in large part to promote uniformity and predictability in federal trials by providing a relatively instructive guide for judges and lawyers concerning the admissibility of evidence.
Rothstein, Paul F
core +2 more sources

