Results 51 to 60 of about 95,826 (286)

Analyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the Web [PDF]

open access: yes, 2015
BrowserID is a complex, real-world Single Sign-On (SSO) System for web applications recently developed by Mozilla. It employs new HTML5 features (such as web messaging and web storage) and cryptographic assertions to provide decentralized login, with the
Fett, Daniel   +2 more
core  

The planar cell polarity protein Vangl2 interacts with the PDZ‐domains of Scribble but not with a unique PDZ‐like domain in Inturned

open access: yesFEBS Letters, EarlyView.
Structural and biochemical characterisations show that the planar cell polarity (PCP) protein Inturned harbours a unique PDZ‐like domain that does not bind canonical PDZ‐binding motifs (PBMs) like that of another PCP protein Vangl2. In contrast, the apical‐basal polarity protein Scribble contains four PDZ domains that bind Vangl2, but one PDZ domain ...
Stephan Wilmes   +4 more
wiley   +1 more source

Exploring Half-Duplex Communication of NFC Read/Write Mode for Secure Multi-Factor Authentication

open access: yesIEEE Access, 2021
Near Field Communication (NFC) is a prominent short-range, contact-less communication technology, which is rapidly getting popular in modern smart devices.
Mohd Sameen Chishti   +2 more
doaj   +1 more source

Model for cryptography protection of confidential information [PDF]

open access: yes, 2018
УДК 004.056 Борсуковський Ю.В., Борсуковська В.Ю. Модель криптографічного захисту конфіденційної інформації В даній статті проведено детальний аналіз вимог щодо формування моделі криптографічного захисту конфіденційної інформації.
Борсуковська, Вікторія Юріївна   +1 more
core  

A framework for multi-mode authentication :

open access: yes, 2003
The use of mobile handheld devices within the workplace is expanding rapidly. These devices are no longer viewed as coveted gadgets for early technology adopters, but have instead become indispensable tools that offer competitive business advantages for the mobile workforce. While these devices provide productivity benefits, they also pose new risks to
Jansen, Wayne   +4 more
openaire   +1 more source

Tau acetylation at K331 has limited impact on tau pathology in vivo

open access: yesFEBS Letters, EarlyView.
We mapped tau post‐translational modifications in humanized MAPT knock‐in mice and in amyloid‐bearing double knock‐in mice. Acetylation within the repeat domain, particularly around K331, showed modest increases under amyloid pathology. To test functional relevance, we generated MAPTK331Q knock‐in mice.
Shoko Hashimoto   +3 more
wiley   +1 more source

Secure Mobile Social Networks using USIM in a Closed Environment [PDF]

open access: yes, 2012
Online social networking and corresponding mobile based applications are gaining popularity and now considered a well-integrated service within mobile devices.
Gehrmann, Christian
core   +1 more source

Gut microbiome and aging—A dynamic interplay of microbes, metabolites, and the immune system

open access: yesFEBS Letters, EarlyView.
Age‐dependent shifts in microbial communities engender shifts in microbial metabolite profiles. These in turn drive shifts in barrier surface permeability of the gut and brain and induce immune activation. When paired with preexisting age‐related chronic inflammation this increases the risk of neuroinflammation and neurodegenerative diseases.
Aaron Mehl, Eran Blacher
wiley   +1 more source

Research on trusted DNP3-BAE protocol based on hash chain

open access: yesEURASIP Journal on Wireless Communications and Networking, 2018
To solve the security problem of industrial Ethernet DNP3 protocol broadcast authentication, the attack vector and security requirements of trusted DNP3 protocol are analysed.
Ye Lu, Tao Feng
doaj   +1 more source

Security and Privacy Issues in Wireless Mesh Networks: A Survey

open access: yes, 2013
This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different ...
A. Gupta   +73 more
core   +1 more source

Home - About - Disclaimer - Privacy