Results 21 to 30 of about 313,696 (165)

SOFIA : software and control flow integrity architecture [PDF]

open access: yes, 2016
Microprocessors used in safety-critical systems are extremely sensitive to software vulnerabilities, as their failure can lead to injury, damage to equipment, or environmental catastrophe.
Coppens, Bart   +8 more
core   +1 more source

CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion

open access: yesCryptography, 2018
In some wireless environments, minimizing the size of messages is paramount due to the resulting significant energy savings. We present CMCC (CBC-MAC-CTR-CBC), an authenticated encryption scheme with associated data (AEAD) that is also nonce misuse ...
Jonathan Trostle
doaj   +1 more source

KALwEN: a new practical and interoperable key management scheme for body sensor networks [PDF]

open access: yes, 2010
Key management is the pillar of a security architecture. Body sensor networks (BSNs) pose several challenges–some inherited from wireless sensor networks (WSNs), some unique to themselves–that require a new key management scheme to be tailor-made.
Gong, Zheng   +4 more
core   +3 more sources

Options for Securing RTP Sessions [PDF]

open access: yes, 2014
The Real-time Transport Protocol (RTP) is used in a large number of different application domains and environments. This heterogeneity implies that different security mechanisms are needed to provide services such as confidentiality ...
Perkins, C., Westerlund, M.
core   +2 more sources

Power Consumption and Calculation Requirement Analysis of AES for WSN IoT

open access: yesSensors, 2018
Because of the ubiquity of Internet of Things (IoT) devices, the power consumption and security of IoT systems have become very important issues. Advanced Encryption Standard (AES) is a block cipher algorithm is commonly used in IoT devices.
Chung-Wen Hung, Wen-Ting Hsu
doaj   +1 more source

Hematology, Clinical Biochemistry, and Blood Cell Morphology Features of Captive Bothrops jararaca From Southeast Brazil. [PDF]

open access: yesVet Clin Pathol
ABSTRACT Background Snakebite envenomation is a worldwide public health issue, particularly relevant to low and middle‐income countries. Bothrops spp. antivenom is needed for snakebite treatment, which requires the maintenance of healthy snakes in captivity.
Alcantara AO   +10 more
europepmc   +2 more sources

Multicenter, Retrospective Determination of the Clinical Utility of Screening Tests in Dogs With Immune-Mediated Hemolytic Anemia in the United Kingdom and Ireland. [PDF]

open access: yesJ Vet Intern Med
ABSTRACT Background Potential triggers of immune‐mediated hemolytic anemia (IMHA) are often identified, but their frequency and the benefit of extensive screening for these to individual dogs is uncertain. Objective To assess the frequency of non‐associative IMHA in dogs undergoing screening in Britain and Ireland and identify where specific tests ...
Morrison T   +8 more
europepmc   +2 more sources

Population Genetics Reveals the Invasion Pathways of <i>Mesembryanthemum nodiflorum</i> in North America. [PDF]

open access: yesEcol Evol
Mesembryanthemum nodiflorum is a species of ice plant native to South Africa that has become invasive in California and Mexico. The present study used RADseq data to run a population genetics analysis to match the invasive populations to those in the native and introduced ranges of the Mediterranean.
van Steenderen CJM   +6 more
europepmc   +2 more sources

The Lead Exposure among Lead Workers: An Epidemiological Study from West Turkey [PDF]

open access: yesIranian Journal of Public Health, 2009
Background: This study has been conducted on workers from several workplaces where materials containing lead are used during December 2006-April 2007 in Eskişehir, a city of the Middle Anatolian Region of Turkey.
M Tozun, A Unsal, B Sirmagul
doaj   +1 more source

Software implementation of a secure firmware update solution in an IoT context [PDF]

open access: yes, 2016
The present paper is concerned with the secure delivery of firmware updates to Internet of Things (IoT) devices. Additionally, it deals with the design of a safe and secure bootloader for a UHF RFID reader.
Hnyk, Pavel   +5 more
core   +2 more sources

Home - About - Disclaimer - Privacy