A Lightweight Authentication and Key Distribution Protocol for XR Glasses Using PUF and Cloud-Assisted ECC. [PDF]
Cha W, Lee HJ, Kook S, Kim K, Won D.
europepmc +1 more source
ABSTRACT Frontline service workers are crucial to service delivery and have been a long‐standing focus of research, with scholars and practitioners alike maintaining an interest in their effective management. As technology increasingly transforms this context, the way in which managers in service organizations communicate with frontline workers has ...
Alexandra Budjanovcanin, Wei‐Ning Yang
wiley +1 more source
A lightweight scalable and dynamic blockchain-based model for storing and retrieving patient healthcare records. [PDF]
Soleimani Nadaf SR +3 more
europepmc +1 more source
Challenges and opportunities in mitigating sarcoptic mange in wild South American camelids
Wild South American camelids—vicuña and guanaco—face threats from sarcoptic mange, a contagious skin disease linked to severe population declines. Despite its impact, major gaps remain in understanding disease dynamics. This review summarizes current knowledge, identifies key data and management gaps, and outlines urgent actions for effective ...
Alynn M. Martin +13 more
wiley +1 more source
SAFARI: pangenome alignment of ancient DNA using purine/pyrimidine encodings. [PDF]
Rubin J +5 more
europepmc +1 more source
ABSTRACT Virtual reality (VR) is a promising new technology that has gained attention from industry and academia, focusing on immersing consumers in simulated services and experiences and, more recently, on recognizing the emerging trend of video watching using VR headsets.
Meng‐Hua Hsieh +2 more
wiley +1 more source
BloomSec: Scalable and privacy-preserving searchable encryption for cloud environments. [PDF]
Khan AN +5 more
europepmc +1 more source
A Hybrid Transformer–CNN Framework for Semantic Behavioral Modeling in Office Malware Detection
ABSTRACT Office documents have emerged as a prevalent attack vector, with adversaries increasingly embedding executable payloads and malicious macros to evade signature‐based detection mechanisms. To address these challenges, this study presents a hybrid Transformer–CNN semantic behavioral modeling framework for Office malware detection.
Sheikh M. Zeeshan Javed +4 more
wiley +1 more source
Blind Rendezvous Distributed Hash Table for Anonymous Peer Discovery
Venkata Rao Dechiraju
openalex +2 more sources
mm2-ivh: simple and precise overlap detection in alpha satellite HORs with interval hashing. [PDF]
Suzuki H +3 more
europepmc +1 more source

