Results 81 to 90 of about 500,755 (330)

An Efficient and Private Authentication Protocol for RFID Systems

open access: yesJournal of Communications Software and Systems, 2013
Radio Frequency IDentification based systems are getting pervasively deployed in many real-life applications in various settings for identification and authentication of remote objects.
Suleyman Kardas   +3 more
doaj  

Technology that enhances without inhibiting learning

open access: yes, 2007
Technology supported information sharing could be argued to both enhance and inhibit learning. However, social and affective issues that motivate learners' technology interactions are often overlooked.
Adams, Anne   +3 more
core   +1 more source

Matching Optimization for Automated Negotiation: From a Privacy-Enhanced Data Modeling Perspective

open access: yesMathematics
Automated negotiation in multi-agent electronic commerce environments relies heavily on efficient and reliable matching mechanisms to connect negotiation participants.
Ya Zhang, Ruiyang Cao, Jinghua Wu
doaj   +1 more source

Efficacy of Intermittent Theta‐Burst Stimulation for Prolonged Disorders of Consciousness: A Prospective, Randomized, Controlled Trial

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Emerging evidence suggests that low‐frequency neural oscillations are dynamically regulated by consciousness levels, with the recovery of low cortical activity potentially serving as a neurophysiological substrate for conscious emergence. Targeted enhancement of these low‐frequency rhythms in patients with disorders of consciousness
Chuan Xu   +10 more
wiley   +1 more source

Location‐Specific Hematoma Volume Predicts Early Neurological Deterioration in Supratentorial ICH

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Early neurological deterioration (END) adversely affects outcomes in patients with intracerebral hemorrhage (ICH). This study aimed to determine the location‐specific hematoma volumes for END in supratentorial ICH patients. Methods We retrospectively analyzed supratentorial ICH patients presenting from two prospective cohorts.
Zuoqiao Li   +10 more
wiley   +1 more source

Enhanced Location K-anonymity Privacy Protection Scheme Based on Geohash [PDF]

open access: yesJisuanji kexue
With the wide application of LBS,location privacy protection is imperative.In recent years,location k-anonymity solution has become a research hotpot which is widely used.However,k-anonymity schemes are vulnerable to background knowledge attacks.Although
LI Yongjun, ZHU Yuefei, BAI Lifang
doaj   +1 more source

Enhancing the security of RCIA ultra-lightweight authentication protocol by using Random Number Generator (RNG) technique [PDF]

open access: yes, 2017
This study is an attempt to enhance the security of Robust Confidentiality, Integrity, and Authentication (RCIA) ultra-lightweight authentication protocols.In the RCIA protocol, IDs value is sent between reader and tag as a constant value.This makes ...
Omar, Mohd Nizam   +2 more
core  

Privacy-enhancing technologies and privacy-enhancing cryptography for wearables

open access: yes
In response to escalating privacy concerns and the need for secure digital communication, cryptographic mechanisms have been developed to ensure impervious information exchange. However, traditional cryptographic approaches are inadequate in dynamic and resource-constrained environments, such as wearable devices.
openaire   +2 more sources

Elevated Connectivity During Language Processing Is Associated With Cognitive Performance in SeLECTS

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Self‐Limited Epilepsy with Centrotemporal Spikes (SeLECTS) is associated with language impairments despite seizures originating in the motor cortex, suggesting aberrant cross‐network interactions. Here we tested whether functional connectivity in SeLECTS during language tasks predicts language performance.
Wendy Qi   +8 more
wiley   +1 more source

Enhancing privacy‐preserving mechanisms in Cloud storage: A novel conceptual framework [PDF]

open access: hybrid, 2023
Alok Mishra   +3 more
openalex   +1 more source

Home - About - Disclaimer - Privacy