Results 51 to 60 of about 3,059,535 (353)
Case study:exploring children’s password knowledge and practices [PDF]
Children use technology from a very young age, and often have to authenticate themselves. Yet very little attention has been paid to designing authentication specifically for this particular target group.
Choong, Yee-Yin+3 more
core +2 more sources
A Hybrid Deep Learning Approach for Secure Biometric Authentication Using Fingerprint Data
Despite significant advancements in fingerprint-based authentication, existing models still suffer from challenges such as high false acceptance and rejection rates, computational inefficiency, and vulnerability to spoofing attacks.
Abdulrahman Hussian+3 more
doaj +1 more source
Land Archive Authentication as a Result of Media Transfer at the Land Office
The digitalization efforts undertaken by the land office do not necessarily guarantee the authenticity of its records or documents in the same manner as physical documents.
Natasha Ajeng Pramesti+2 more
semanticscholar +1 more source
This study simultaneously investigated circulating tumor cells (CTCs) and exosomes from small‐cell lung cancer (SCLC) patients. The elevated expression of JUNB and CXCR4 in CTCs was a poor prognostic factor for SCLC patients, whereas exosomal overexpression of these biomarkers revealed a high discrimination ability of patients from healthy individuals,
Dimitrios Papakonstantinou+13 more
wiley +1 more source
The complexity of law enforcement in online trading fraud cases poses significant challenges. Sellers can carry out fraudulent activities through product counterfeiting or making transactions outside of e-commerce platforms, while buyers can commit fraud
Anton Satila+4 more
doaj +1 more source
FOCAL: A Forgery Localization Framework Based on Video Coding Self-Consistency
Forgery operations on video contents are nowadays within the reach of anyone, thanks to the availability of powerful and user-friendly editing software. Integrity verification and authentication of videos represent a major interest in both journalism (e ...
Sebastiano Verde+5 more
doaj +1 more source
Mean-Set Attack: Cryptanalysis of Sibert et al. Authentication Protocol
We analyze the Sibert et al. group-based (Feige-Fiat-Shamir type) authentication protocol and show that the protocol is not computationally zero-knowledge.
Mosina, Natalia, Ushakov, Alexander
core +1 more source
Human cytomegalovirus infection is common in normal prostate epithelium, prostate tumor tissue, and prostate cancer cell lines. CMV promotes cell survival, proliferation, and androgen receptor signaling. Anti‐CMV pharmaceutical compounds in clinical use inhibited cell expansion in prostate cancer models in vitro and in vivo, motivating investigation ...
Johanna Classon+13 more
wiley +1 more source
In this work, melt electrowriting is used to fabricate a 3D printed scaffold design that generates engineered cardiac tissues with in‐plane contraction, mimicking natural myocardium. It is shown that these tissues display advanced maturation and functionality.
Olalla Iglesias‐García+23 more
wiley +1 more source
Learned Treatises as Direct Evidence: The Alabama Experience [PDF]
A majority of American jurisdictions refuse to permit the use of learned treatises as direct evidence, reasoning that to do so would violate the rule against hearsay evidence.
core +1 more source