Results 81 to 90 of about 2,279,222 (327)

Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

open access: yesSensors, 2014
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy.
Younsung Choi   +5 more
doaj   +1 more source

Liquid biopsy epigenetics: establishing a molecular profile based on cell‐free DNA

open access: yesMolecular Oncology, EarlyView.
Cell‐free DNA (cfDNA) fragments in plasma from cancer patients carry epigenetic signatures reflecting their cells of origin. These epigenetic features include DNA methylation, nucleosome modifications, and variations in fragmentation. This review describes the biological properties of each feature and explores optimal strategies for harnessing cfDNA ...
Christoffer Trier Maansson   +2 more
wiley   +1 more source

Mean-Set Attack: Cryptanalysis of Sibert et al. Authentication Protocol

open access: yes, 2010
We analyze the Sibert et al. group-based (Feige-Fiat-Shamir type) authentication protocol and show that the protocol is not computationally zero-knowledge.
Mosina, Natalia, Ushakov, Alexander
core   +1 more source

Quantum identity authentication scheme based on measurement-device-independent quantum key distribution protocol

open access: yesTongxin xuebao, 2016
Utilized to security properties of measurement-device-independent quantum key distribution (MDI-QKD)protocol, quantum identity authentication scheme based on MDI (QIA-MDI)protocol was presented.
Ying-di DONG   +3 more
doaj   +2 more sources

IoV-SMAP: Secure and Efficient Message Authentication Protocol for IoV in Smart City Environment

open access: yesIEEE Access, 2020
With the emergence of the concept of smart city and the increasing demands for a range of vehicles, Internet of Vehicles (IoV) has achieved a lot of attention by providing multiple benefits, including vehicle emergence, accidents, levels of pollution ...
Sungjin Yu   +4 more
semanticscholar   +1 more source

Intein‐based modular chimeric antigen receptor platform for specific CD19/CD20 co‐targeting

open access: yesMolecular Oncology, EarlyView.
CARtein is a modular CAR platform that uses split inteins to splice antigen‐recognition modules onto a universal signaling backbone, enabling precise, scarless assembly without re‐engineering signaling domains. Deployed here against CD19 and CD20 in B‐cell malignancies, the design supports flexible multi‐antigen targeting to boost T‐cell activation and
Pablo Gonzalez‐Garcia   +9 more
wiley   +1 more source

Secure Directories [PDF]

open access: yes, 2000
This paper describes the mechanisms that are needed in order to provide a secure directory service based on the X.500 data model. A brief introduction to the X.500 data model is given followed by an overview of the Lightweight Directory Access Protocol ...
Chadwick, David W.
core  

A Novel Protocol Using Captive Portals for FIDO2 Network Authentication

open access: yesApplied Sciences
FIDO2 authentication is starting to be applied in numerous web authentication services, aiming to replace passwords and their known vulnerabilities. However, this new authentication method has not been integrated yet with network authentication systems ...
Martiño Rivera-Dourado   +3 more
doaj   +1 more source

A Sidechain-Based Decentralized Authentication Scheme via Optimized Two-Way Peg Protocol for Smart Community

open access: yesIEEE Open Journal of the Communications Society, 2020
In this work, we propose a novel sidechain structure via an optimized two-way peg protocol for device authentication in the smart community in order to overcome the limitations of existing approaches.
Min Li   +3 more
doaj   +1 more source

PROPOSED LIGHTWEIGHT PROTOCOL FOR IOT AUTHENTICATION

open access: yesIraqi Journal for Computers and Informatics, 2018
The Internet of Things (IoT) alludes to interestingly identifiable items (things) which can communicate with differentquestions through the worldwide framework of remote/wired Internet. The correspondence system among an expansive number of assetobliged gadgets that produce substantial volumes of information affects the security and protection of the ...
openaire   +4 more sources

Home - About - Disclaimer - Privacy