Results 31 to 40 of about 77,587 (303)
An Efficient Code-Based One-Time Blind Signature Scheme for Electronic Forensics
We propose a one-time blind signature scheme based on coding theory, which is improved on the basis of the SHMWW protocol. By adding two blinding factors, the anonymity of users is protected.
Haiyan Xiu +3 more
doaj +1 more source
Multi-Step Attack Detection Based on Pre-Trained Hidden Markov Models
Currently, hidden Markov-based multi-step attack detection models are mainly trained using the unsupervised Baum–Welch algorithm. The Baum–Welch algorithm is sensitive to the initial values of model parameters.
Xu Zhang +7 more
doaj +1 more source
Security as a context, generative force, and policy concern for the co-production of cyberspace: historical overview since WWII until the end of the Cold War [PDF]
Many cybersecurity literature take the 1990s as a starting point to trace the process of securitising cyberspace; implicitly suggesting that it initially emerged as a non-security sector, which was then securitised.
Fouad, Noran Shafik
core
Objectives There is growing interest in evaluating new strategies to delay or prevent post‐traumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury.
Kevin Kennedy +9 more
wiley +1 more source
Simple yet Effective ECG Identity Authentication With Low EER and Without Retraining
Recently, electrocardiogram (ECG) signals have garnered significant attention in the field of identity authentication. For identity authentication, the ECG signals collected by wearing smart devices need to be determined whether the signal belongs to an ...
Mingyu Dong +5 more
doaj +1 more source
Usability and Trust in Information Systems [PDF]
The need for people to protect themselves and their assets is as old as humankind. People's physical safety and their possessions have always been at risk from deliberate attack or accidental damage.
Sasse, MA
core
Objective We examined whether 18 months of strength training in individuals with knee varus alignment and medial tibiofemoral osteoarthritis (OA) reduced knee joint loads during walking compared to an attention control group. Methods This study was a secondary analysis of a randomized clinical trial that compared the effects of strength training to a ...
Stephen P. Messier +12 more
wiley +1 more source
A Provably Secure Authentication Protocol Based on PUF and ECC for IoT Cloud-Edge Environments
The Internet of Things (IoT) cloud model provides an efficient scheme for rapid collection, storage, processing, and analysis of massive node data, and its application has gradually expanded to key areas such as healthcare and transportation.
Xiong Wang +4 more
doaj +1 more source
Cyberspace Safety and Security [PDF]
CSS 2012 Regular Papers.- Session 1: Mobile Security.- Identity and Its Authentication Protocol for Secure Mobile Commerce Applications.- SafeCode - Safeguarding Security and Privacy of User Data on Stolen iOS Devices.- Protection Aspects of Iconic Passwords on Mobile Devices.- Detecting Control Flow in Smarphones: Combining Static and Dynamic Analyses.
openaire +1 more source
The documentation of component manufacture has become an essential part of today's production processes, especially for the analysis and optimization of production or component design with regard to structural performance, economic efficiency, and sustainability.
Björn Denker +4 more
wiley +1 more source

