Results 61 to 70 of about 95,826 (286)

Development of a typing behaviour recognition mechanism on Android [PDF]

open access: yes, 2012
This paper proposes a biometric authentication system which use password based and behavioural traits (typing behaviours) authentication technology to establish user’s identity on a mobile phone.
Huang, Xuan   +2 more
core   +3 more sources

Analysing the IOBC Authenticated Encryption Mode [PDF]

open access: yes, 2013
The idea of combining a very simple form of added plaintext redundancy with a special mode of data encryption to provide data integrity is an old one; however, despite its wide deployment in protocols such as Kerberos, it has largely been superseded by provably secure authenticated encryption techniques.
openaire   +1 more source

Valosin‐containing protein counteracts ATP‐driven dissolution of FUS condensates through its ATPase activity in vitro

open access: yesFEBS Letters, EarlyView.
Biomolecular condensates formed by fused in sarcoma (FUS) are dissolved by high ATP concentrations yet persist in cells. Using a reconstituted system, we demonstrate that valosin‐containing protein (VCP), an AAA+ ATPase, counteracts ATP‐driven dissolution of FUS condensates through its D2 ATPase activity.
Hitomi Kimura   +2 more
wiley   +1 more source

Human Retina Based Identification System Using Gabor Filters and GDA Technique

open access: yesJournal of Communications Software and Systems, 2020
A biometric authentication system provides an automatic person authentication based on some characteristic features possessed by the individual. Among all other biometrics, human retina is a secure and reliable source of person recognition as it is ...
Shahad Sultan, Mayada Faris Ghanim
doaj  

Fault Attacks on XEX Mode with Application to Certain Authenticated Encryption Modes

open access: yes, 2017
The XOR-Encrypt-XOR (XEX) block cipher mode was introduced by Rogaway in 2004. XEX mode uses nonce-based secret masks (L) that are distinct for each message. The existence of secret masks in XEX mode prevents the application of conventional fault attack techniques, such as differential fault analysis. This work investigates other types of fault attacks
Hassan Qahur Al Mahri   +4 more
openaire   +3 more sources

Multi-user Security of the Elephant v2 Authenticated Encryption Mode [PDF]

open access: yes, 2022
SAC ...
Tim Beyne   +3 more
openaire   +1 more source

Hyperosmotic stress induces PARP1‐mediated HPF1‐dependent mono(ADP‐ribosyl)ation

open access: yesFEBS Letters, EarlyView.
Sorbitol‐induced hyperosmotic stress rapidly induces reversible mono(ADP‐ribosyl)ation (MARylation) on PARP1 without the signs of genotoxic signaling. We show that PARP1 autoMARylation is HPF1 dependent and forms hydroxylamine‐resistant O‐glycosidic linkages.
Anna Georgina Kopasz   +11 more
wiley   +1 more source

Research of Authentication Method of Intrinsically Safe Interconnection of Coal Mine Monitoring and Control System

open access: yesGong-kuang zidonghua, 2010
According to characteristics of complex structure and various interconnection equipments with increasing quantity of coal mine monitoring and control system,the paper analyzed applicability of traditional authentication method of intrinsically safe ...
ZOU Zhe-qiang
doaj  

A Big Data Stream-Driven Risk Recognition Approach for Hospital Accounting Management Systems

open access: yesIEEE Access, 2023
This work is confronted with hospital accounting management systems where business volume is usually large and trivial. While designing system prototype and processing algorithms, it is required to integrate realistic big data stream as the main factors ...
Yining Wang   +3 more
doaj   +1 more source

Do not trust me: Using malicious IdPs for analyzing and attacking Single Sign-On [PDF]

open access: yes, 2014
Single Sign-On (SSO) systems simplify login procedures by using an an Identity Provider (IdP) to issue authentication tokens which can be consumed by Service Providers (SPs). Traditionally, IdPs are modeled as trusted third parties.
Mainka, Christian   +2 more
core  

Home - About - Disclaimer - Privacy