Results 41 to 50 of about 186,232 (264)
Coding Solutions for the Secure Biometric Storage Problem [PDF]
The paper studies the problem of securely storing biometric passwords, such as fingerprints and irises. With the help of coding theory Juels and Wattenberg derived in 1999 a scheme where similar input strings will be accepted as the same biometric.
Rosenthal, Joachim, Schipani, Davide
core +1 more source
We report molecularly engineered 2D COF films for high‐performance humidity sensors. The developed COFTPT‐THTA ultrathin film features triazine‐functionalized π‐conjugated backbones and high‐density surface hydroxyl groups. This unique architecture facilitates an electron‐proton coupled transport mechanism.
Liangyu Dong +16 more
wiley +1 more source
This work presents a novel solution for multivariate time series anomaly detection in industrial control systems (ICSs), specifically tailored for resource‐constrained environments. At its core, the quantized gated recurrent unit variational autoencoder (
Daniel Fährmann +3 more
doaj +1 more source
Face Off: An Examination of State Biometric Privacy Statutes & Data Harm Remedies [PDF]
As biometric authentication becomes an increasingly popular method of security among consumers, only three states currently have statutes detailing how such data may be collected, used, retained, and released.
Rivera, Michael A.
core +1 more source
Transducers convert physical signals into electrical and optical representations, yet each mechanism is bounded by intrinsic trade‐offs across bandwidth, sensitivity, speed, and energy. This review maps transduction mechanisms across physical scale and frequency, showing how heterogeneous integration and multiphysics co‐design transform isolated ...
Aolei Xu +8 more
wiley +1 more source
The Acceptance of Digital Surveillance in an Age of Big Data
News media companies and human rights organizations have been increasingly warning about the rise of the surveillance state that builds on distrust and mass surveillance of its citizens.
Mika Westerlund +2 more
doaj +1 more source
Ear Biometrics- An Alternative Biometric
This paper is one of the parts of a biometric based identity verification security system development project. Today, the most successful biometric based identification technologies such as fingerprint and iris scan are used worldwide in both criminal investigations and high security facilities.
R. Parimala, C. Jayakumar
openaire +1 more source
Passive Shape‐Adaptive Fluidic Interface for Enhanced Skin‐Sensor Coupling in Wearable Devices
This study presents a passive fluidic interface for wearable biosensors that adapts to static and dynamic body shape changes to maintain consistent skin contact. Flexible, fluid‐filled pouches redistribute pressure from high‐load areas to regions requiring improved contact, enhancing signal quality and comfort in a compact, low‐energy design for ...
Natalia Sanchez‐Tamayo +6 more
wiley +1 more source
Background The three-prime repair exonuclease 1, TREX1, degrades cytosolic DNA to prevent aberrant immune activation. Its inactivation results in DNA accumulation in the cytosol and induction of the cGAS-STING DNA sensing pathway, interferon signaling ...
Marwa Shekfeh +2 more
doaj +1 more source
The explosion of available microarray data on human cancer increases the urgency for developing methods for effectively sharing this data among clinical cancer investigators. Lack of a smooth interface between the databases and statistical analysis tools
Yingdong Zhao, Richard Simon
doaj +1 more source

