Results 61 to 70 of about 974,570 (322)

HIV/AIDS, TO DISCLOSE OR NOT TO DISCLOSE: THAT IS THE QUESTION

open access: yesPotchefstroom Electronic Law Journal, 2013
The systemic consequences of the HIV/AIDS pandemic in South Africa are evident not only in demographic, economic and social trends, but also on a micro- and personal level, where they are devastating.
Andra le Roux-Kemp
doaj   +1 more source

A novel secure data outsourcing scheme based on data hiding and secret sharing for relational databases

open access: yesIET Communications, 2023
Data encryption‐based and secret sharing‐based data outsourcing schemes protect the confidentiality of sensitive attributes but not their secrecy. Ciphertexts/shares generated by a data encryption/secret sharing scheme can attract the attention of ...
Peyman Rahmani   +2 more
doaj   +1 more source

Composing security protocols: from confidentiality to privacy [PDF]

open access: yes, 2014
Security protocols are used in many of our daily-life applications, and our privacy largely depends on their design. Formal verification techniques have proved their usefulness to analyse these protocols, but they become so complex that modular ...
Arapinis, Myrto   +2 more
core   +3 more sources

H2O2‐Activated Serotonin Precursor Probe for Mapping Neuronal Redox Homeostasis Reveals 5‐HT Interactions with Neighboring Proteins Under Oxidative Stress

open access: yesAdvanced Science, EarlyView.
HOP, an innovative ICT‐based fluorescent probe, visualizes H2O2 in stressed neurons while locally releasing serotonin (5‐HT) for real‐time protein interaction mapping. Its unique tandem sensing and labeling strategy reveals 5‐HT's role under oxidative stress, offering a powerful tool for neurophysiological research and therapeutic discovery.
Yani Liu   +9 more
wiley   +1 more source

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines [PDF]

open access: yesJournal of Advances in Computer Engineering and Technology, 2019
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity ...
Olayemi Olaniyi   +3 more
doaj  

A Novel Cultivation System for Germ Cell Proliferation and Sustaining Whole Testicular Niche

open access: yesAdvanced Science, EarlyView.
A hydrogel microneedle‐based system enables whole testicular cultivation, supporting spermatogonial proliferation and enhancing spermatogenesis in vitro. This ‘whole testicular spermatogonia pool’ (WTSP) significantly increases spermatid production and fertility potential in mice. This system also promotes spermatogonial expansion in human fetal testes,
Yu Xia   +14 more
wiley   +1 more source

Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity [PDF]

open access: yesTechnology Innovation Management Review, 2013
Progress in operational cybersecurity has been difficult to demonstrate. In spite of the considerable research and development investments made for more than 30 years, many government, industrial, financial, and consumer information systems continue to ...
Jeff Hughes, George Cybenko
doaj  

Half of Vermont Academic and Public Libraries Lack Written Confidentiality Policies Despite Directors’ Support for Principles of Patron Confidentiality

open access: yesEvidence Based Library and Information Practice, 2008
A Review of: Magi, Trina J., “The Gap between Theory and Practice: A Study of the Prevalence and Strength of Patron Confidentiality Policies in Public and Academic Libraries.” Library & Information Science Research 29 (2007): 455-70 ...
Stephanie Walker
doaj   +1 more source

Towards security monitoring patterns [PDF]

open access: yes, 2007
Runtime monitoring is performed during system execution to detect whether the system’s behaviour deviates from that described by requirements. To support this activity we have developed a monitoring framework that expresses the requirements to be ...
Androutsopoulos, K.   +2 more
core   +2 more sources

A Novel Cranial Bone Transport Technique Repairs Skull Defect and Minimizes Brain Injury Outcome in Traumatic Brain Injury Rats

open access: yesAdvanced Science, EarlyView.
This study introduces a novel, safe, and effective surgical technique: Cranial bone transport (CBT) to improve traumatic brain injury (TBI) outcomes in rats. CBT significantly accelerated skull defect bone repair in addition to its promoting effects on neurological function recovery. This work provides an alternative therapy for patients suffering from
Shanshan Bai   +20 more
wiley   +1 more source

Home - About - Disclaimer - Privacy