Results 31 to 40 of about 335,598 (166)
The Lead Exposure among Lead Workers: An Epidemiological Study from West Turkey [PDF]
Background: This study has been conducted on workers from several workplaces where materials containing lead are used during December 2006-April 2007 in Eskişehir, a city of the Middle Anatolian Region of Turkey.
M Tozun, A Unsal, B Sirmagul
doaj +1 more source
Software implementation of a secure firmware update solution in an IoT context [PDF]
The present paper is concerned with the secure delivery of firmware updates to Internet of Things (IoT) devices. Additionally, it deals with the design of a safe and secure bootloader for a UHF RFID reader.
Hnyk, Pavel +5 more
core +2 more sources
AES-CBC Software Execution Optimization
With the proliferation of high-speed wireless networking, the necessity for efficient, robust and secure encryption modes is ever increasing. But, cryptography is primarily a computationally intensive process.
Doma, Jayramsingh +2 more
core +1 more source
Fly-By-Wireless for Next Generation Aircraft: Challenges and Potential solutions [PDF]
”Fly-By-Wireless” paradigm based on wireless connectivity in aircraft has the potential to improve efficiency and flexibility, while reducing weight, fuel consumption and maintenance costs.
Dang, Dinh Khanh +2 more
core +2 more sources
Link-layer Security in TSCH Networks: Effect on Slot Duration [PDF]
International audienceThe IEEE802.15.4e-2012 standard is widely used in multi-hop wireless Industrial Internet of Things (IIoT)applications. In the Time-Slotted Channel Hopping (TSCH) mode, nodes are synchronized, and time iscut into timeslots.
Dujovne +14 more
core +4 more sources
A MAC Mode for Lightweight Block Ciphers [PDF]
status ...
A Baysal +35 more
core +3 more sources
Securing Internet of Things with Lightweight IPsec [PDF]
Real-world deployments of wireless sensor networks (WSNs) require secure communication. It is important that a receiver is able to verify that sensor data was generated by trusted nodes. In some cases it may also be necessary to encrypt sensor data in
Chung, Tony +5 more
core +1 more source
A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Network
A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment.
Akyildiz +14 more
core +2 more sources
Archiving Futurity Within the Missing and Murdered Indigenous Women's Crisis
ABSTRACT In this article, we examine how settler colonization and gendered violence against Indigenous women are remembered and recorded in two archival registers: 18th‐century records from the Massachusetts Archives Collection (MAC) and a 21st‐century corpus of posts using the hashtag MMIW (Missing and Murdered Indigenous Women) on X (formerly Twitter)
Lindsay Martel Montgomery +2 more
wiley +1 more source
Chaining & counter-based block cipher mode for authentication
For raising the operation efficiency of block cipher algorithms,a fast authentication mode based on chaining & counter(CCTR) was put forward;and its security was proved.Its speed was about 30% faster than that of authentication modes in common use(for ...
HUANG Yu-hua1 +2 more
doaj +2 more sources

