Results 41 to 50 of about 120,057 (278)
Group authentication and key distribution for sensors in wireless body area network
Wireless body area network can be employed to collect patient’s electronic health data. To guarantee the reliability and confidentiality of the collected data, secure data transmission in wireless body area network is required.
Yong Ding +4 more
doaj +1 more source
This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ...
Erritali, Mohammed +2 more
core +1 more source
Objectives Systemic lupus erythematosus (SLE) is a heterogenous inflammatory condition, with widely varying global prevalence estimates. Frequency of SLE in the general population of Australia has been reported to be notably lower than contemporary estimates in countries such as the US or UK at 19‐39 per 100,000 as opposed to 65‐97 per 100,000.
Lucinda Roper +7 more
wiley +1 more source
A brief review on the impossibility of quantum bit commitment [PDF]
The desire to obtain an unconditionally secure bit commitment protocol in quantum cryptography was expressed for the first time thirteen years ago.
Claude Crépeau +4 more
core +5 more sources
Security improvement of using modified coherent state for quantum cryptography
Weak coherent states as a photon source for quantum cryptography have limit in secure data rate and transmission distance because of the presence of multi-photon events and loss in transmission line. Two-photon events in a coherent state can be taken out
C. Bennett +8 more
core +1 more source
The documentation of component manufacture has become an essential part of today's production processes, especially for the analysis and optimization of production or component design with regard to structural performance, economic efficiency, and sustainability.
Björn Denker +4 more
wiley +1 more source
A verifiable essential secret image sharing scheme based on HLRs (VESIS‐(t, s, k, n))
In traditional secret image sharing schemes, a secret image is shared among shareholders who have the same position. But if the shareholders have two different positions, essential and non‐essential, it is necessary to use essential secret image sharing ...
Massoud Hadian Dehkordi +2 more
doaj +1 more source
Dynamic Analysis of a Fractional Breast Cancer Model with Incommensurate Orders and Optimal Control
This paper constructs a fundamental mathematical model to depict the therapeutic effects of two drugs on breast cancer patients. The model is described by fractional order differential equations with two control variables.
Yanling Zhao, Ruiqing Shi
doaj +1 more source
Throughout various experimental results, it has been revealed that the direct sampling method (DSM) can be applied to microwave imaging and inverse problem for a fast identification of a small anomaly.
Won-Kwang Park
doaj +1 more source
3D‐Printed Giant Magnetoresistive (GMR) Sensors Based on Self Compliant Springs
This work explores 3D‐printed GMR sensors utilizing self‐compliant spring structures and conductive PLA composites. By optimizing arm width, we achieved high piezoresistive (0.34%/mm) and magnetoresistive (0.77%/mT) sensitivities. Demonstrated through Bluetooth‐integrated pressure and magnetic position sensing, these full printed low‐cost, customizable
Josu Fernández Maestu +4 more
wiley +1 more source

