Results 41 to 50 of about 1,275,223 (320)

GPS Spoofing and the Financial Sector [PDF]

open access: yes, 2011
All global financial exchanges, including the New York Stock Exchange (NYSE) and the Nasdaq, have gone digital. Large data centers hold the exchanges’ matching engines—the modern-day equivalent of the historic trading floor—in racks of interconnected ...
Humphreys, Todd
core   +1 more source

Development of 4T1 breast cancer mouse model system for preclinical carbonic anhydrase IX studies

open access: yesFEBS Open Bio, EarlyView.
Carbonic anhydrase IX (CAIX) is a well‐recognised therapeutic target and prognostic biomarker in cancer. We developed and characterised a robust murine breast cancer model system that is suitable for CAIX studies in vitro and in vivo—it comprises both CAIX‐positive and CAIX‐negative controls and provides a solid platform for the comprehensive ...
Zane Kalniņa   +13 more
wiley   +1 more source

Reinforcing Security and Usability of Crypto-Wallet with Post-Quantum Cryptography and Zero-Knowledge Proof [PDF]

open access: yesarXiv, 2023
Crypto-wallets or digital asset wallets are a crucial aspect of managing cryptocurrencies and other digital assets such as NFTs. However, these wallets are not immune to security threats, particularly from the growing risk of quantum computing. The use of traditional public-key cryptography systems in digital asset wallets makes them vulnerable to ...
arxiv  

A Novel Digital Watermarking Algorithm using Random Matrix Image [PDF]

open access: yesInternational Journal of Computer Applications, Volume 61, Number 2, pp. 18-12, 2013, 2013
The availability of bandwidth for internet access is sufficient enough to communicate digital assets. These digital assets are subjected to various types of threats. [19] As a result of this, protection mechanism required for the protection of digital assets is of priority in research.
arxiv   +1 more source

Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE [PDF]

open access: yes, 2015
As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are ...
AS Sodiya   +12 more
core   +1 more source

Implementation of needle‐tracking technology for real‐time transrectal ultrasound‐guided interstitial gynecological HDR brachytherapy: A feasibility study

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Purpose To investigate the feasibility of adapting a commercial prostate biopsy system for transrectal ultrasound (TRUS)‐guided hybrid gynecological (GYN) high‐dose‐rate (HDR) brachytherapy (BT). Leveraging 3D‐TRUS and MR image fusion, the prototype system aims to improve real‐time needle placement accuracy.
Lindsey H. Bloom   +8 more
wiley   +1 more source

Beyond the visible: thermal data for facial soft biometric estimation

open access: yesEURASIP Journal on Image and Video Processing
In recent years, the estimation of biometric parameters from facial visuals, including images and videos, has emerged as a prominent area of research. However, the robustness of deep learning-based models is challenged, particularly in the presence of ...
Nelida Mirabet-Herranz, Jean-Luc Dugelay
doaj   +1 more source

DICOM attribute manipulation tool: Easily change frame of reference, series instance, and SOP instance UID

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Purpose In radiation oncology, the integration and registration of multiple imaging modalities is a crucial aspect of the diagnosis and treatment planning process. These images are often inherently registered, a useful feature in most cases, but possibly a hindrance when registration modifications are required.
Brian M. Anderson, Casey Bojechko
wiley   +1 more source

Permutation-Based Hash Chains with Application to Password Hashing

open access: yesIACR Transactions on Symmetric Cryptology
Hash chain based password systems are a useful way to guarantee authentication with one-time passwords. The core idea dates back to Lamport, and is specified in RFC 1760 as S/Key. At CCS 2017, Kogan et al.
Charlotte Lefevre, Bart Mennink
doaj   +1 more source

A DSA-like digital signature protocol [PDF]

open access: yesJDMSC, 2020, 2021
In this paper we propose a new digital signature protocol inspired by the DSA algorithm. The security and the complexity are analyzed. Our method constitutes an alternative if the classical scheme DSA is broken.
arxiv  

Home - About - Disclaimer - Privacy