Results 81 to 90 of about 2,338,489 (263)

Secure spontaneous emergency access to personal health record [PDF]

open access: yes, 2011
We propose a system which enables access to the user's Personal Health Record (PHR) in the event of emergency. The access typically occurs in an ad-hoc and spontaneous manner and the user is usually unconscious, hence rendering the unavailability of ...
Asim, M.   +3 more
core  

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

RBAU: Noval Redactable Model with Audit Mechanism and Key Update for Alliance Chain

open access: yesMathematics
With the widespread application of alliance chain technology in diverse scenarios, its immutability has gradually revealed certain limitations in practical use.
Yineng Chen   +6 more
doaj   +1 more source

Implementation of Node Authentication for WSN Using Hash Chains

open access: yesProcedia Computer Science, 2016
AbstractThis paper presents the design and implementation of a lightweight node authentication protocol which comprises of node registration, node authentication and key establishment phases. The solution leverages the low computational overheads associated with cryptographically secure one-way hash chains and Elliptical Curve Crytography (ECC) without
Ayaz Hassan Moon   +2 more
openaire   +2 more sources

Network Traffic Sampling System Based on Storage Compression for Application Classification Detection

open access: yesIEEE Access, 2020
With the development of the Internet, numerous new applications have emerged, the features of which are constantly changing. It is necessary to perform application classification detection on the network traffic to monitor the changes in the applications.
Shichang Xuan   +5 more
doaj   +1 more source

Blockchain technology disruptions: Exploring accounting and auditing academics and practitioners' perception

open access: yesAccounting &Finance, EarlyView.
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo   +3 more
wiley   +1 more source

Study of consensus protocols and improvement of the Federated Byzantine Agreement (FBA) algorithm [PDF]

open access: yes, 2019
At a present time, it has been proven that blockchain technology has influenced to a great extent the way of human interaction in a digital world. The operation of the blockchain systems allows the peers to implement digital transactions in a Peer to ...
Zoi, Aspasia
core   +1 more source

Identification of MEF2A, MEF2C, and MEF2D interactomes in basal and Fsk‐stimulated mouse MA‐10 Leydig cells

open access: yesAndrology, EarlyView.
Abstract Background Myocyte enhancer factor 2 transcription factors regulate essential transcriptional programs in various cell types. The activity of myocyte enhancer factor 2 factors is modulated through interactions with cofactors, chromatin remodelers, and other regulatory proteins, which are dependent on cell context and physiological state.
Karine de Mattos   +4 more
wiley   +1 more source

A Secure Cooperative Sensing Protocol for Cognitive Radio Networks [PDF]

open access: yes, 2010
Cognitive radio networks sense spectrum occupancy and manage themselves to operate in unused bands without disturbing licensed users. Spectrum sensing is more accurate if jointly performed by several reliable nodes. Even though cooperative sensing is an
Garrigues Olivella, Carles   +1 more
core  

Agent-Based Simulations of Blockchain protocols illustrated via Kadena's Chainweb

open access: yes, 2019
While many distributed consensus protocols provide robust liveness and consistency guarantees under the presence of malicious actors, quantitative estimates of how economic incentives affect security are few and far between.
Chitra, Tarun   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy