Results 31 to 40 of about 561,825 (309)
The Internet of Things (IoT) forms a foundation for cyber-physical systems. We propose an efficient and secure authentication scheme for machine-to-machine (M2M) networks in IoT enabled cyber-physical systems. Smart objects and smart devices over CPS are
K. M. Renuka +3 more
doaj +1 more source
Formation and Inhibition of Calcium Carbonate Crystals under Cathodic Polarization Conditions
The formation of CaCO3 crystals on the cathode surface and the scale-inhibition performance of scale inhibitor 2-phosphonobutane-1,2,4-tricarboxylic acid (PBTCA) on the cathode surface were studied by methods of solution analysis, gravimetric analysis ...
Kun Sheng +7 more
doaj +1 more source
Developed Protocol for Key Exchange Based on Irreducible Polynomial [PDF]
The Aim of this paper is to design a protocol for key exchanging to work on the available computers for different data security application. This paper proposed idea to modify the Diffie-Hellman key exchange by using truncated polynomial instead of ...
Abdul Monem S. Rahma +2 more
doaj +1 more source
The QQUIC Transport Protocol: Quantum-Assisted UDP Internet Connections
Quantum key distribution, initialized in 1984, is a commercialized secure communication method that enables two parties to produce a shared random secret key using quantum mechanics.
Peng Yan, Nengkun Yu
doaj +1 more source
ABSTRACT Background Psychological safety (PS) is essential for teamwork, communication, and patient safety in complex healthcare environments. In pediatric oncology, interprofessional collaboration occurs under high emotional and organizational demands. Low PS may increase stress, burnout, and adverse events.
Alexandros Rahn +4 more
wiley +1 more source
Comparison of the Corrosion Behavior of Brass in TiO2 and Al2O3 Nanofluids
The corrosion behavior of brass in TiO2 and Al2O3 nanofluids using a simulated cooling water (SCW) as the base solution and sodium dodecyl benzene sulfonate (SDBS) as the dispersant was studied by electrochemical measurements and surface analysis in this
Siyu Xie +6 more
doaj +1 more source
Proposal to Complex DES Security Using Diffie Hellman Injection [PDF]
Data Encryption Standard (DES) is based on a round of starters, from the results of the use of multi-stage permutation and replacement to the more complex algorithm which adopts the symmetric key.
Shatha habeeb Jafar
doaj +1 more source
Multi-factor Authenticated Key Exchange [PDF]
In order to increase the security for authenticated key exchange protocols, various authentication means can be used together. In this paper, we introduce a security model for multi-factor authenticated key exchange, which combines a password, a secure device, and biometric authentications.
Pointcheval, David, Zimmer, Sébastien
openaire +2 more sources
Enteropathogenic E. coli (EPEC) infects the human intestinal epithelium, resulting in severe illness and diarrhoea. In this study, we compared the infection of cancer‐derived cell lines with human organoid‐derived models of the small intestine. We observed a delayed in attachment, inflammation and cell death on primary cells, indicating that host ...
Mastura Neyazi +5 more
wiley +1 more source
DAGS: Key encapsulation using dyadic GS codes
Code-based cryptography is one of the main areas of interest for NIST’s Post-Quantum Cryptography Standardization call. In this paper, we introduce DAGS, a Key Encapsulation Mechanism (KEM) based on quasi-dyadic generalized Srivastava codes.
Banegas Gustavo +12 more
doaj +1 more source

