Results 31 to 40 of about 77,587 (303)

An Efficient Code-Based One-Time Blind Signature Scheme for Electronic Forensics

open access: yesIET Information Security
We propose a one-time blind signature scheme based on coding theory, which is improved on the basis of the SHMWW protocol. By adding two blinding factors, the anonymity of users is protected.
Haiyan Xiu   +3 more
doaj   +1 more source

Multi-Step Attack Detection Based on Pre-Trained Hidden Markov Models

open access: yesSensors, 2022
Currently, hidden Markov-based multi-step attack detection models are mainly trained using the unsupervised Baum–Welch algorithm. The Baum–Welch algorithm is sensitive to the initial values of model parameters.
Xu Zhang   +7 more
doaj   +1 more source

Security as a context, generative force, and policy concern for the co-production of cyberspace: historical overview since WWII until the end of the Cold War [PDF]

open access: yes, 2018
Many cybersecurity literature take the 1990s as a starting point to trace the process of securitising cyberspace; implicitly suggesting that it initially emerged as a non-security sector, which was then securitised.
Fouad, Noran Shafik
core  

Preferences for post‐traumatic osteoarthritis prevention strategies in individuals with anterior cruciate ligament injury

open access: yesArthritis Care &Research, Accepted Article.
Objectives There is growing interest in evaluating new strategies to delay or prevent post‐traumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury.
Kevin Kennedy   +9 more
wiley   +1 more source

Simple yet Effective ECG Identity Authentication With Low EER and Without Retraining

open access: yesIET Biometrics
Recently, electrocardiogram (ECG) signals have garnered significant attention in the field of identity authentication. For identity authentication, the ECG signals collected by wearing smart devices need to be determined whether the signal belongs to an ...
Mingyu Dong   +5 more
doaj   +1 more source

Usability and Trust in Information Systems [PDF]

open access: yes, 2005
The need for people to protect themselves and their assets is as old as humankind. People's physical safety and their possessions have always been at risk from deliberate attack or accidental damage.
Sasse, MA
core  

Does Long‐Term Lower Extremity Strength Training in Adults With Knee Osteoarthritis and Varus Alignment Reduce Knee Joint Loading During Gait?

open access: yesArthritis Care &Research, EarlyView.
Objective We examined whether 18 months of strength training in individuals with knee varus alignment and medial tibiofemoral osteoarthritis (OA) reduced knee joint loads during walking compared to an attention control group. Methods This study was a secondary analysis of a randomized clinical trial that compared the effects of strength training to a ...
Stephen P. Messier   +12 more
wiley   +1 more source

A Provably Secure Authentication Protocol Based on PUF and ECC for IoT Cloud-Edge Environments

open access: yesIET Information Security
The Internet of Things (IoT) cloud model provides an efficient scheme for rapid collection, storage, processing, and analysis of massive node data, and its application has gradually expanded to key areas such as healthcare and transportation.
Xiong Wang   +4 more
doaj   +1 more source

Cyberspace Safety and Security [PDF]

open access: yes, 2012
CSS 2012 Regular Papers.- Session 1: Mobile Security.- Identity and Its Authentication Protocol for Secure Mobile Commerce Applications.- SafeCode - Safeguarding Security and Privacy of User Data on Stolen iOS Devices.- Protection Aspects of Iconic Passwords on Mobile Devices.- Detecting Control Flow in Smarphones: Combining Static and Dynamic Analyses.
openaire   +1 more source

A Concept of a Digital and Traceable Manufacturing Documentation Based on Formalized Process Description Applied on Composite Aircraft Moveable

open access: yesAdvanced Engineering Materials, EarlyView.
The documentation of component manufacture has become an essential part of today's production processes, especially for the analysis and optimization of production or component design with regard to structural performance, economic efficiency, and sustainability.
Björn Denker   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy