SOFIA : software and control flow integrity architecture [PDF]
Microprocessors used in safety-critical systems are extremely sensitive to software vulnerabilities, as their failure can lead to injury, damage to equipment, or environmental catastrophe.
Coppens, Bart +8 more
core +1 more source
CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion
In some wireless environments, minimizing the size of messages is paramount due to the resulting significant energy savings. We present CMCC (CBC-MAC-CTR-CBC), an authenticated encryption scheme with associated data (AEAD) that is also nonce misuse ...
Jonathan Trostle
doaj +1 more source
KALwEN: a new practical and interoperable key management scheme for body sensor networks [PDF]
Key management is the pillar of a security architecture. Body sensor networks (BSNs) pose several challenges–some inherited from wireless sensor networks (WSNs), some unique to themselves–that require a new key management scheme to be tailor-made.
Gong, Zheng +4 more
core +3 more sources
Options for Securing RTP Sessions [PDF]
The Real-time Transport Protocol (RTP) is used in a large number of different application domains and environments. This heterogeneity implies that different security mechanisms are needed to provide services such as confidentiality ...
Perkins, C., Westerlund, M.
core +2 more sources
Power Consumption and Calculation Requirement Analysis of AES for WSN IoT
Because of the ubiquity of Internet of Things (IoT) devices, the power consumption and security of IoT systems have become very important issues. Advanced Encryption Standard (AES) is a block cipher algorithm is commonly used in IoT devices.
Chung-Wen Hung, Wen-Ting Hsu
doaj +1 more source
Hematology, Clinical Biochemistry, and Blood Cell Morphology Features of Captive Bothrops jararaca From Southeast Brazil. [PDF]
ABSTRACT Background Snakebite envenomation is a worldwide public health issue, particularly relevant to low and middle‐income countries. Bothrops spp. antivenom is needed for snakebite treatment, which requires the maintenance of healthy snakes in captivity.
Alcantara AO +10 more
europepmc +2 more sources
Multicenter, Retrospective Determination of the Clinical Utility of Screening Tests in Dogs With Immune-Mediated Hemolytic Anemia in the United Kingdom and Ireland. [PDF]
ABSTRACT Background Potential triggers of immune‐mediated hemolytic anemia (IMHA) are often identified, but their frequency and the benefit of extensive screening for these to individual dogs is uncertain. Objective To assess the frequency of non‐associative IMHA in dogs undergoing screening in Britain and Ireland and identify where specific tests ...
Morrison T +8 more
europepmc +2 more sources
Population Genetics Reveals the Invasion Pathways of <i>Mesembryanthemum nodiflorum</i> in North America. [PDF]
Mesembryanthemum nodiflorum is a species of ice plant native to South Africa that has become invasive in California and Mexico. The present study used RADseq data to run a population genetics analysis to match the invasive populations to those in the native and introduced ranges of the Mediterranean.
van Steenderen CJM +6 more
europepmc +2 more sources
The Lead Exposure among Lead Workers: An Epidemiological Study from West Turkey [PDF]
Background: This study has been conducted on workers from several workplaces where materials containing lead are used during December 2006-April 2007 in Eskişehir, a city of the Middle Anatolian Region of Turkey.
M Tozun, A Unsal, B Sirmagul
doaj +1 more source
Software implementation of a secure firmware update solution in an IoT context [PDF]
The present paper is concerned with the secure delivery of firmware updates to Internet of Things (IoT) devices. Additionally, it deals with the design of a safe and secure bootloader for a UHF RFID reader.
Hnyk, Pavel +5 more
core +2 more sources

