An Efficient and Private Authentication Protocol for RFID Systems
Radio Frequency IDentification based systems are getting pervasively deployed in many real-life applications in various settings for identification and authentication of remote objects.
Suleyman Kardas +3 more
doaj
Technology that enhances without inhibiting learning
Technology supported information sharing could be argued to both enhance and inhibit learning. However, social and affective issues that motivate learners' technology interactions are often overlooked.
Adams, Anne +3 more
core +1 more source
Matching Optimization for Automated Negotiation: From a Privacy-Enhanced Data Modeling Perspective
Automated negotiation in multi-agent electronic commerce environments relies heavily on efficient and reliable matching mechanisms to connect negotiation participants.
Ya Zhang, Ruiyang Cao, Jinghua Wu
doaj +1 more source
ABSTRACT Background Emerging evidence suggests that low‐frequency neural oscillations are dynamically regulated by consciousness levels, with the recovery of low cortical activity potentially serving as a neurophysiological substrate for conscious emergence. Targeted enhancement of these low‐frequency rhythms in patients with disorders of consciousness
Chuan Xu +10 more
wiley +1 more source
Location‐Specific Hematoma Volume Predicts Early Neurological Deterioration in Supratentorial ICH
ABSTRACT Objective Early neurological deterioration (END) adversely affects outcomes in patients with intracerebral hemorrhage (ICH). This study aimed to determine the location‐specific hematoma volumes for END in supratentorial ICH patients. Methods We retrospectively analyzed supratentorial ICH patients presenting from two prospective cohorts.
Zuoqiao Li +10 more
wiley +1 more source
Enhanced Location K-anonymity Privacy Protection Scheme Based on Geohash [PDF]
With the wide application of LBS,location privacy protection is imperative.In recent years,location k-anonymity solution has become a research hotpot which is widely used.However,k-anonymity schemes are vulnerable to background knowledge attacks.Although
LI Yongjun, ZHU Yuefei, BAI Lifang
doaj +1 more source
Enhancing the security of RCIA ultra-lightweight authentication protocol by using Random Number Generator (RNG) technique [PDF]
This study is an attempt to enhance the security of Robust Confidentiality, Integrity, and Authentication (RCIA) ultra-lightweight authentication protocols.In the RCIA protocol, IDs value is sent between reader and tag as a constant value.This makes ...
Omar, Mohd Nizam +2 more
core
Privacy-enhancing technologies and privacy-enhancing cryptography for wearables
In response to escalating privacy concerns and the need for secure digital communication, cryptographic mechanisms have been developed to ensure impervious information exchange. However, traditional cryptographic approaches are inadequate in dynamic and resource-constrained environments, such as wearable devices.
openaire +2 more sources
Elevated Connectivity During Language Processing Is Associated With Cognitive Performance in SeLECTS
ABSTRACT Objective Self‐Limited Epilepsy with Centrotemporal Spikes (SeLECTS) is associated with language impairments despite seizures originating in the motor cortex, suggesting aberrant cross‐network interactions. Here we tested whether functional connectivity in SeLECTS during language tasks predicts language performance.
Wendy Qi +8 more
wiley +1 more source
Enhancing privacy‐preserving mechanisms in Cloud storage: A novel conceptual framework [PDF]
Alok Mishra +3 more
openalex +1 more source

