Results 31 to 40 of about 3,500,013 (329)
The Application of AHP Model to Guide Decision Makers: A Case Study of E-banking Security
Changes in technology have resulted in new ways for bankers to deliver their services to costumers. Electronic banking systems in various forms are the evidence of such advancement.
Hwang, Junseok, Syamsuddin, Irfan
core +1 more source
Cryptochrome and PAS/LOV proteins play intricate roles in circadian clocks where they act as both sensors and mediators of protein–protein interactions. Their ubiquitous presence in signaling networks has positioned them as targets for small‐molecule therapeutics. This review provides a structural introduction to these protein families.
Eric D. Brinckman +2 more
wiley +1 more source
THE GENERATING RANDOM SEQUENCES WITH THE INCREASED CRYPTOGRAPHIC STRENGTH
Random sequences are used in various applications in construction of cryptographic systems or formations of noise-type signals. For these tasks there is used the program generator of random sequences which is the determined device. Such a generator, as a
Volodymyr Korchynskyi +3 more
doaj +1 more source
Health Information and Social Security Entitlements [PDF]
This study examines whether new health information, obtained through medical screening, affects entitlements to Social Security benefits. Random assignment of information is derived from a unique feature of the Continuous National Health and Nutrition ...
Perry Singleton
core +1 more source
Information Security as Strategic (In)effectivity
Security of information flow is commonly understood as preventing any information leakage, regardless of how grave or harmless consequences the leakage can have.
A Fielder +11 more
core +1 more source
The economics of user effort in information security [PDF]
A significant number of security breaches result from employees' failures to comply with security policies. The cause is often an honest mistake, such as when an employee enters their password in a phishing website, believing it to be a legitimate one.1 ...
Beautement, A, Sasse, A
core +1 more source
Liquid biopsy enables minimally invasive, real‐time molecular profiling through analysis of circulating biomarkers in biological fluids. This Perspective highlights the importance of training pathologists through integrative educational programs, such as the European Masters in Molecular Pathology, to ensure effective and equitable implementation of ...
Marius Ilié +13 more
wiley +1 more source
Information Flow Model for Commercial Security [PDF]
Information flow in Discretionary Access Control (DAC) is a well-known difficult problem. This paper formalizes the fundamental concepts and establishes a theory of information flow security.
Pan, Jene
core +1 more source
Chaotic iterations versus Spread-spectrum: chaos and stego security [PDF]
A new framework for information hiding security, called chaos-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to ...
Bahi, Jacques M. +2 more
core +3 more sources
Etoposide induces DNA damage, activating p53‐dependent apoptosis via caspase‐3/7, which cleaves PARP1. Dammarenediol II enhances this apoptotic pathway by suppressing O‐GlcNAc transferase activity, further decreasing O‐GlcNAcylation. The reduction in O‐GlcNAc levels boosts p53‐driven apoptosis and influences the Akt/GSK3β/mTOR signaling pathway ...
Jaehoon Lee +8 more
wiley +1 more source

