Results 31 to 40 of about 335,598 (166)

The Lead Exposure among Lead Workers: An Epidemiological Study from West Turkey [PDF]

open access: yesIranian Journal of Public Health, 2009
Background: This study has been conducted on workers from several workplaces where materials containing lead are used during December 2006-April 2007 in Eskişehir, a city of the Middle Anatolian Region of Turkey.
M Tozun, A Unsal, B Sirmagul
doaj   +1 more source

Software implementation of a secure firmware update solution in an IoT context [PDF]

open access: yes, 2016
The present paper is concerned with the secure delivery of firmware updates to Internet of Things (IoT) devices. Additionally, it deals with the design of a safe and secure bootloader for a UHF RFID reader.
Hnyk, Pavel   +5 more
core   +2 more sources

AES-CBC Software Execution Optimization

open access: yes, 2012
With the proliferation of high-speed wireless networking, the necessity for efficient, robust and secure encryption modes is ever increasing. But, cryptography is primarily a computationally intensive process.
Doma, Jayramsingh   +2 more
core   +1 more source

Fly-By-Wireless for Next Generation Aircraft: Challenges and Potential solutions [PDF]

open access: yes, 2012
”Fly-By-Wireless” paradigm based on wireless connectivity in aircraft has the potential to improve efficiency and flexibility, while reducing weight, fuel consumption and maintenance costs.
Dang, Dinh Khanh   +2 more
core   +2 more sources

Link-layer Security in TSCH Networks: Effect on Slot Duration [PDF]

open access: yes, 2016
International audienceThe IEEE802.15.4e-2012 standard is widely used in multi-hop wireless Industrial Internet of Things (IIoT)applications. In the Time-Slotted Channel Hopping (TSCH) mode, nodes are synchronized, and time iscut into timeslots.
Dujovne   +14 more
core   +4 more sources

A MAC Mode for Lightweight Block Ciphers [PDF]

open access: yes, 2016
status ...
A Baysal   +35 more
core   +3 more sources

Securing Internet of Things with Lightweight IPsec [PDF]

open access: yes, 2010
Real-world deployments of wireless sensor networks (WSNs) require secure communication. It is important that a receiver is able to verify that sensor data was generated by trusted nodes. In some cases it may also be necessary to encrypt sensor data in
Chung, Tony   +5 more
core   +1 more source

A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Network

open access: yes, 2011
A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment.
Akyildiz   +14 more
core   +2 more sources

Archiving Futurity Within the Missing and Murdered Indigenous Women's Crisis

open access: yesAmerican Anthropologist, EarlyView.
ABSTRACT In this article, we examine how settler colonization and gendered violence against Indigenous women are remembered and recorded in two archival registers: 18th‐century records from the Massachusetts Archives Collection (MAC) and a 21st‐century corpus of posts using the hashtag MMIW (Missing and Murdered Indigenous Women) on X (formerly Twitter)
Lindsay Martel Montgomery   +2 more
wiley   +1 more source

Chaining & counter-based block cipher mode for authentication

open access: yesTongxin xuebao, 2009
For raising the operation efficiency of block cipher algorithms,a fast authentication mode based on chaining & counter(CCTR) was put forward;and its security was proved.Its speed was about 30% faster than that of authentication modes in common use(for ...
HUANG Yu-hua1   +2 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy