Results 61 to 70 of about 95,826 (286)
Development of a typing behaviour recognition mechanism on Android [PDF]
This paper proposes a biometric authentication system which use password based and behavioural traits (typing behaviours) authentication technology to establish user’s identity on a mobile phone.
Huang, Xuan +2 more
core +3 more sources
Analysing the IOBC Authenticated Encryption Mode [PDF]
The idea of combining a very simple form of added plaintext redundancy with a special mode of data encryption to provide data integrity is an old one; however, despite its wide deployment in protocols such as Kerberos, it has largely been superseded by provably secure authenticated encryption techniques.
openaire +1 more source
Biomolecular condensates formed by fused in sarcoma (FUS) are dissolved by high ATP concentrations yet persist in cells. Using a reconstituted system, we demonstrate that valosin‐containing protein (VCP), an AAA+ ATPase, counteracts ATP‐driven dissolution of FUS condensates through its D2 ATPase activity.
Hitomi Kimura +2 more
wiley +1 more source
Human Retina Based Identification System Using Gabor Filters and GDA Technique
A biometric authentication system provides an automatic person authentication based on some characteristic features possessed by the individual. Among all other biometrics, human retina is a secure and reliable source of person recognition as it is ...
Shahad Sultan, Mayada Faris Ghanim
doaj
Fault Attacks on XEX Mode with Application to Certain Authenticated Encryption Modes
The XOR-Encrypt-XOR (XEX) block cipher mode was introduced by Rogaway in 2004. XEX mode uses nonce-based secret masks (L) that are distinct for each message. The existence of secret masks in XEX mode prevents the application of conventional fault attack techniques, such as differential fault analysis. This work investigates other types of fault attacks
Hassan Qahur Al Mahri +4 more
openaire +3 more sources
Multi-user Security of the Elephant v2 Authenticated Encryption Mode [PDF]
SAC ...
Tim Beyne +3 more
openaire +1 more source
Hyperosmotic stress induces PARP1‐mediated HPF1‐dependent mono(ADP‐ribosyl)ation
Sorbitol‐induced hyperosmotic stress rapidly induces reversible mono(ADP‐ribosyl)ation (MARylation) on PARP1 without the signs of genotoxic signaling. We show that PARP1 autoMARylation is HPF1 dependent and forms hydroxylamine‐resistant O‐glycosidic linkages.
Anna Georgina Kopasz +11 more
wiley +1 more source
According to characteristics of complex structure and various interconnection equipments with increasing quantity of coal mine monitoring and control system,the paper analyzed applicability of traditional authentication method of intrinsically safe ...
ZOU Zhe-qiang
doaj
A Big Data Stream-Driven Risk Recognition Approach for Hospital Accounting Management Systems
This work is confronted with hospital accounting management systems where business volume is usually large and trivial. While designing system prototype and processing algorithms, it is required to integrate realistic big data stream as the main factors ...
Yining Wang +3 more
doaj +1 more source
Do not trust me: Using malicious IdPs for analyzing and attacking Single Sign-On [PDF]
Single Sign-On (SSO) systems simplify login procedures by using an an Identity Provider (IdP) to issue authentication tokens which can be consumed by Service Providers (SPs). Traditionally, IdPs are modeled as trusted third parties.
Mainka, Christian +2 more
core

