Results 41 to 50 of about 95,826 (286)

Easy 4G/LTE IMSI Catchers for Non-Programmers [PDF]

open access: yes, 2017
IMSI Catchers are tracking devices that break the privacy of the subscribers of mobile access networks, with disruptive effects to both the communication services and the trust and credibility of mobile network operators.
A Dabrowski, M Lichtman, P McGuiggan
core   +2 more sources

Organoids in pediatric cancer research

open access: yesFEBS Letters, EarlyView.
Organoid technology has revolutionized cancer research, yet its application in pediatric oncology remains limited. Recent advances have enabled the development of pediatric tumor organoids, offering new insights into disease biology, treatment response, and interactions with the tumor microenvironment.
Carla Ríos Arceo, Jarno Drost
wiley   +1 more source

Security of 5G-V2X: Technologies, Standardization and Research Directions

open access: yes, 2019
Cellular-Vehicle to Everything (C-V2X) aims at resolving issues pertaining to the traditional usability of Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) networking.
Guizani, Nadra   +2 more
core   +1 more source

Structural biology of ferritin nanocages

open access: yesFEBS Letters, EarlyView.
Ferritin is a conserved iron‐storage protein that sequesters iron as a ferric mineral core within a nanocage, protecting cells from oxidative damage and maintaining iron homeostasis. This review discusses ferritin biology, structure, and function, and highlights recent cryo‐EM studies revealing mechanisms of ferritinophagy, cellular iron uptake, and ...
Eloise Mastrangelo, Flavio Di Pisa
wiley   +1 more source

Secure Pick Up: Implicit Authentication When You Start Using the Smartphone

open access: yes, 2017
We propose Secure Pick Up (SPU), a convenient, lightweight, in-device, non-intrusive and automatic-learning system for smartphone user authentication.
Jin, Hongxia   +4 more
core   +1 more source

ESTATE: A Lightweight and Low Energy Authenticated Encryption Mode

open access: yesIACR Transactions on Symmetric Cryptology, 2020
NIST has recently initiated a standardization project for efficient lightweight authenticated encryption schemes. SUNDAE, a candidate in this project, achieves optimal state size which results in low circuit overhead on top of the underlying block cipher. In addition, SUNDAE provides security in nonce-misuse scenario as well.
Avik Chakraborti   +5 more
openaire   +4 more sources

Organ‐specific redox imbalances in spinal muscular atrophy mice are partially rescued by SMN antisense oligonucleotides

open access: yesFEBS Letters, EarlyView.
We identified a systemic, progressive loss of protein S‐glutathionylation—detected by nonreducing western blotting—alongside dysregulation of glutathione‐cycle enzymes in both neuronal and peripheral tissues of Taiwanese SMA mice. These alterations were partially rescued by SMN antisense oligonucleotide therapy, revealing persistent redox imbalance as ...
Sofia Vrettou, Brunhilde Wirth
wiley   +1 more source

Research of WLAN authentication in roaming environment with the trend of network integration

open access: yesTongxin xuebao, 2012
In the tendency of network convergence,the method of WLAN network client authentication based on telecommunications network will be the main way of WLAN authentication in the future.In order to make WLAN authentication efficiency and security under ...
Zhang-zhe LIU, Hua-ying SHU
doaj   +2 more sources

Design and Performance Analysis of Sensor Proxy-AAA Authentication Scheme Based on Fast Handover and Forwarding Mode for IP-based Internet of Things

open access: yesEAI Endorsed Transactions on Mobile Communications and Applications, 2017
Recently interest in Internet of Things(IoT) is increasing, and a variety of the security technologies that are suitable for Internet of Things has being studied. In order to maintain the trustworthy connectivity and the accessibility of distributed IoT,
Chulhee Cho   +3 more
doaj   +1 more source

Implementasi Enkripsi dan Otentikasi Transmisi Data ZeroMQ Menggunakan Advanced Encryption Standard

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2020
Communication via sockets is used to transmit information between applications or between processes over network or locally. ZeroMQ is a library for sending messages using sockets that are quite well known. Talking about sending data, message security is
I Made Sukarsa   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy