Results 31 to 40 of about 8,202 (205)

A new phylogeny of Anastrepha (Diptera: Tephritidae) based on nuclear loci obtained by phylogenomic methods

open access: yesSystematic Entomology, Volume 51, Issue 1, January‐March 2026.
We present an extensive phylogenetic analysis, based on 293 nuclear loci and 728 individuals representing 237 species of Anastrepha, the largest and most economically important New World genus of Tephritidae. The analysis strongly supports the monophyly of most Anastrepha species groups, also revealing previously unknown relationships among species and
Allen L. Norrbom   +19 more
wiley   +1 more source

Verification of STAR-Vote and Evaluation of FDR and ProVerif

open access: yes, 2017
We present the first automated privacy analysis of STAR-Vote, a real world voting system design with sophisticated "end-to-end" cryptography, using FDR and ProVerif. We also evaluate the effectiveness of these tools.
Moran, Murat, Wallach, Dan S.
core   +1 more source

Optimistic Non-repudiation Protocol Analysis [PDF]

open access: yes, 2007
The original publication is available at www.springerlink.com ; ISBN 978-3-540-72353-0 (Pring) 0302-9743 (Online) 1611-3349International audienceNon-repudiation protocols with session labels have a number of vulnerabilities.
A. Armando   +11 more
core   +4 more sources

Enhanced IoT Security: Blockchain, Cryptography, and CNN Integration for Mask Detection

open access: yesJournal of Electrical and Computer Engineering, Volume 2026, Issue 1, 2026.
Security concerns have become paramount, especially with the increasing reliance on facial recognition technology for identity verification. The use of masks, while essential for health protection, poses a significant challenge for these systems, hindering accurate identification.
Imen Hagui   +3 more
wiley   +1 more source

Token-based authentication for Hadoop platform

open access: yesAin Shams Engineering Journal, 2023
The Hadoop platform has been adopted to process Big Data. The existing authentication protocol for Hadoop is Kerberos. Kerberos protocol has a vulnerability against weak passwords, and it is not scalable.
Mohamed Haggag   +2 more
doaj   +1 more source

Lengths May Break Privacy – Or How to Check for Equivalences with Length [PDF]

open access: yes, 2013
Security protocols have been successfully analyzed using symbolic models, where messages are represented by terms and protocols by processes. Privacy properties like anonymity or untraceability are typically expressed as equivalence between processes ...
A. Armando   +4 more
core   +4 more sources

Primer registro del género Platyscapa Motschoulsky, 1863 (Chalcidoidea: Agaonidae) para la República Dominicana

open access: yesNovitates Caribaea
Para confirmar la presencia de la avispa polinizadora de Ficus religiosa en República Dominicana, se recolectaron cinco siconos de cuatro árboles ubicados en igual número de localidades de la ciudad de Santo Domingo.
Candy G Ramírez Pérez
doaj   +1 more source

An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments

open access: yesJournal of King Saud University: Computer and Information Sciences, 2017
In the literature, many three-party authenticated key exchange (3PAKE) protocols are put forwarded to established a secure session key between two users with the help of trusted server. The computed session key will ensure secure message exchange between
S.K. Hafizul Islam   +5 more
doaj   +1 more source

El problema del héroe cómico en Avispas [PDF]

open access: yesSynthesis (La Plata), 2014
In spite of the fact that the critics has argued that Philocleon is the comic hero of Wasps, in this work we propose to demonstrate that this function is exercised by his son Bdelicleon. Bdelicleon have several features in common with other heroes of the early comedy: its role as a spokesperson of the positive discourse endorsed in the play, its moral ...
openaire   +4 more sources

Mangrove Pollinator Functional Diversity Decreases With Patch Size and Landscape Anthropization

open access: yesBiotropica, Volume 57, Issue 5, September 2025.
This study explores how land use changes impact pollinator diversity in mangrove ecosystems, focusing on the effects of patch size and landscape anthropization on pollinators with different functional traits. Results show that smaller mangrove patches can support higher pollinator abundance, richness, and diversity; however, overall pollinator metrics ...
Paula María Montoya‐Pfeiffer   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy