Results 31 to 40 of about 1,589,033 (311)

Secret key expansion from covert communication

open access: yes, 2017
Covert communication allows us to transmit messages in such a way that it is not possible to detect that the communication is occurring. This provides protection in situations where knowledge that people are talking to each other may be incriminating to ...
Amiri, Ryan, Arrazola, Juan Miguel
core   +1 more source

An Edge-Fog Secure Self-Authenticable Data Transfer Protocol

open access: yesSensors, 2019
Development of the Internet of Things (IoT) opens many new challenges. As IoT devices are getting smaller and smaller, the problems of so-called “constrained devices” arise.
Algimantas Venčkauskas   +5 more
doaj   +1 more source

Design of CAN Bus Communication Interfaces for Forestry Machines

open access: yesComputers, 2021
This paper presents the initial developments of new hardware devices targeted for CAN (Controller Area Network) bus communications in forest machines. CAN bus is a widely used protocol for communications in the automobile area.
Geoffrey Spencer   +4 more
doaj   +1 more source

Inefficiency and classical communication bounds for conversion between partially entangled pure bipartite states

open access: yes, 2005
We derive lower limits on the inefficiency and classical communication costs of dilution between two-term bipartite pure states that are partially entangled.
Fortescue, Ben, Lo, Hoi-Kwong
core   +1 more source

Efficient Privacy Preserving Distributed Clustering Based on Secret Sharing [PDF]

open access: yes, 2007
In this paper, we propose a privacy preserving distributed clustering protocol for horizontally partitioned data based on a very efficient homomorphic additive secret sharing scheme.
Savas, Erkay, Savaş, Erkay
core  

Protocol for direct counterfactual quantum communication

open access: yes, 2013
It has long been assumed in physics that for information to travel between two parties in empty space, "Alice" and "Bob", physical particles have to travel between them.
Al-Amri, M.   +3 more
core   +1 more source

Exploring Preferences for a Digital Single‐Session Intervention for Adolescent Siblings of Youth With Cancer

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction Adolescent siblings of children with cancer are at elevated risk for psychosocial problems. Unfortunately, various barriers such as limited family time and resources, conflicting schedules, and psychosocial staffing constraints at cancer centers hinder sibling access to support.
Christina M. Amaro   +10 more
wiley   +1 more source

Security Issues on Industrial Internet of Things: Overview and Challenges

open access: yesComputers, 2023
The Industrial Internet of Things (IIoT), where numerous smart devices associated with sensors, actuators, computers, and people communicate with shared networks, has gained advantages in many fields, such as smart manufacturing, intelligent ...
Maoli Wang   +3 more
doaj   +1 more source

Implementing Health‐Related Quality of Life Assessment in Pediatric Oncology: A Feasibility Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background There is growing interest in embedding health‐related quality of life (HRQoL) assessment and patient‐reported outcome measures (PROMs) within clinical cancer care. This study evaluated the feasibility, acceptability, and usability of implementing an electronic PROM (ePROM) platform to measure HRQoL in children with cancer ...
Mikaela Doig   +13 more
wiley   +1 more source

Study on the technical specification of communication interface and protocol for intelligent mine

open access: yesGong-kuang zidonghua, 2023
At present, there are some problems in the construction of the intelligent mine, such as the non-uniform interface protocol and the formation of new 'information island'.
DING Zhen   +19 more
doaj   +1 more source

Home - About - Disclaimer - Privacy