Results 51 to 60 of about 3,059,535 (353)

Case study:exploring children’s password knowledge and practices [PDF]

open access: yes, 2019
Children use technology from a very young age, and often have to authenticate themselves. Yet very little attention has been paid to designing authentication specifically for this particular target group.
Choong, Yee-Yin   +3 more
core   +2 more sources

A Hybrid Deep Learning Approach for Secure Biometric Authentication Using Fingerprint Data

open access: yesComputers
Despite significant advancements in fingerprint-based authentication, existing models still suffer from challenges such as high false acceptance and rejection rates, computational inefficiency, and vulnerability to spoofing attacks.
Abdulrahman Hussian   +3 more
doaj   +1 more source

Land Archive Authentication as a Result of Media Transfer at the Land Office

open access: yesMarcapada Jurnal Kebijakan Pertanahan
The digitalization efforts undertaken by the land office do not necessarily guarantee the authenticity of its records or documents in the same manner as physical documents.
Natasha Ajeng Pramesti   +2 more
semanticscholar   +1 more source

Integrative analysis of circulating tumor cells (CTCs) and exosomes from small‐cell lung cancer (SCLC) patients: a comprehensive approach

open access: yesMolecular Oncology, EarlyView.
This study simultaneously investigated circulating tumor cells (CTCs) and exosomes from small‐cell lung cancer (SCLC) patients. The elevated expression of JUNB and CXCR4 in CTCs was a poor prognostic factor for SCLC patients, whereas exosomal overexpression of these biomarkers revealed a high discrimination ability of patients from healthy individuals,
Dimitrios Papakonstantinou   +13 more
wiley   +1 more source

The Urgency of identity verification and safeguarding personal information during online transactions

open access: yesLaw and Justice
The complexity of law enforcement in online trading fraud cases poses significant challenges. Sellers can carry out fraudulent activities through product counterfeiting or making transactions outside of e-commerce platforms, while buyers can commit fraud
Anton Satila   +4 more
doaj   +1 more source

FOCAL: A Forgery Localization Framework Based on Video Coding Self-Consistency

open access: yesIEEE Open Journal of Signal Processing, 2021
Forgery operations on video contents are nowadays within the reach of anyone, thanks to the availability of powerful and user-friendly editing software. Integrity verification and authentication of videos represent a major interest in both journalism (e ...
Sebastiano Verde   +5 more
doaj   +1 more source

Mean-Set Attack: Cryptanalysis of Sibert et al. Authentication Protocol

open access: yes, 2010
We analyze the Sibert et al. group-based (Feige-Fiat-Shamir type) authentication protocol and show that the protocol is not computationally zero-knowledge.
Mosina, Natalia, Ushakov, Alexander
core   +1 more source

Cytomegalovirus infection is common in prostate cancer and antiviral therapies inhibit progression in disease models

open access: yesMolecular Oncology, EarlyView.
Human cytomegalovirus infection is common in normal prostate epithelium, prostate tumor tissue, and prostate cancer cell lines. CMV promotes cell survival, proliferation, and androgen receptor signaling. Anti‐CMV pharmaceutical compounds in clinical use inhibited cell expansion in prostate cancer models in vitro and in vivo, motivating investigation ...
Johanna Classon   +13 more
wiley   +1 more source

Biologically‐Inspired Melt Electrowriting for the Generation of Highly Biomimetic Functional Myocardium

open access: yesAdvanced Functional Materials, EarlyView.
In this work, melt electrowriting is used to fabricate a 3D printed scaffold design that generates engineered cardiac tissues with in‐plane contraction, mimicking natural myocardium. It is shown that these tissues display advanced maturation and functionality.
Olalla Iglesias‐García   +23 more
wiley   +1 more source

Learned Treatises as Direct Evidence: The Alabama Experience [PDF]

open access: yes, 1967
A majority of American jurisdictions refuse to permit the use of learned treatises as direct evidence, reasoning that to do so would violate the rule against hearsay evidence.

core   +1 more source

Home - About - Disclaimer - Privacy