Results 131 to 140 of about 6,124,262 (401)
Reconfigurable Security: Edge Computing-based Framework for IoT [PDF]
In various scenarios, achieving security between IoT devices is challenging since the devices may have different dedicated communication standards, resource constraints as well as various applications. In this article, we first provide requirements and existing solutions for IoT security.
arxiv
Computational Security of Quantum Encryption [PDF]
Quantum-mechanical devices have the potential to transform cryptography. Most research in this area has focused either on the information-theoretic advantages of quantum protocols or on the security of classical cryptographic schemes against quantum attacks.
Alagic, G.+5 more
openaire +6 more sources
ABSTRACT Objective Sleep spindles are an electrophysiological fingerprint of the sleeping human brain. They can be described in terms of duration, frequency, amplitude, and density, and vary widely according to age and sex. Spindles play a role in sleep and wake functions and are altered in several neurological and psychiatric disorders.
Julien Coelho+8 more
wiley +1 more source
Towards Security Requirements in Online Summative Assessments
Confidentiality, integrity and availability (C-I-A) are the security requirements fundamental to any computer system. Similarly, the hardware, software and data are important critical assets.
Apampa, K.M, Argles, D, Wills, G.B
core
Secure multiparty computations without computers
AbstractMany simple calculations can be done easier without computers than by using them. We show that the same holds for secure multiparty computations if the function to be computed is simple enough. Our starting point is an observation of Bert den Boer: a multiparty computation of a logical AND-gate can be performed by five simple playing cards.
Ari Renvall, Valtteri Niemi
openaire +2 more sources
Objective Posttraumatic osteoarthritis (PTOA) accounts for nearly 12% of osteoarthritis incidences and often occurs after anterior cruciate ligament (ACL) tear. Ensuring the uptake of preventive treatments for PTOA requires that investigators and clinicians understand factors influencing patients to seek preventive therapies.
Lily M. Waddell+10 more
wiley +1 more source
Software for Wearable Devices: Challenges and Opportunities
Wearable devices are a new form of mobile computer system that provides exclusive and user-personalized services. Wearable devices bring new issues and challenges to computer science and technology.
Chen, Xin+5 more
core +1 more source
RhoA and Rac1 as Mechanotransduction Mediators in Colorectal Cancer
Analysing RhoA and Rac1 protein levels in Colorectal cancer (CRC) samples under mechanical strain highlights their potential as diagnostic markers. Monitoring their activity could offer valuable insights into how cancer spreads, paving the way for new approaches to better understand and diagnose colorectal cancer.
Sharda Yadav+5 more
wiley +1 more source
Retracted: Computer Security Issues and Legal System Based on Cloud Computing. [PDF]
Intelligence And Neuroscience C.
europepmc +1 more source
Multilayer ferrite inductor prototypes are fabricated by cofiring metallized tapes of NiCuZn ferrite and glass‐ceramic composite. Prerequisites for a predictive component simulation are discussed. An automated data‐pipeline stores and semantically links the experimental data acquired in the study according to a domain ontology.
Björn Mieller+8 more
wiley +1 more source