Results 31 to 40 of about 561,825 (309)

Design of a Secure Password-Based Authentication Scheme for M2M Networks in IoT Enabled Cyber-Physical Systems

open access: yesIEEE Access, 2019
The Internet of Things (IoT) forms a foundation for cyber-physical systems. We propose an efficient and secure authentication scheme for machine-to-machine (M2M) networks in IoT enabled cyber-physical systems. Smart objects and smart devices over CPS are
K. M. Renuka   +3 more
doaj   +1 more source

Formation and Inhibition of Calcium Carbonate Crystals under Cathodic Polarization Conditions

open access: yesCrystals, 2020
The formation of CaCO3 crystals on the cathode surface and the scale-inhibition performance of scale inhibitor 2-phosphonobutane-1,2,4-tricarboxylic acid (PBTCA) on the cathode surface were studied by methods of solution analysis, gravimetric analysis ...
Kun Sheng   +7 more
doaj   +1 more source

Developed Protocol for Key Exchange Based on Irreducible Polynomial [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2012
The Aim of this paper is to design a protocol for key exchanging to work on the available computers for different data security application. This paper proposed idea to modify the Diffie-Hellman key exchange by using truncated polynomial instead of ...
Abdul Monem S. Rahma   +2 more
doaj   +1 more source

The QQUIC Transport Protocol: Quantum-Assisted UDP Internet Connections

open access: yesEntropy, 2022
Quantum key distribution, initialized in 1984, is a commercialized secure communication method that enables two parties to produce a shared random secret key using quantum mechanics.
Peng Yan, Nengkun Yu
doaj   +1 more source

Psychological Safety Among Interprofessional Pediatric Oncology Teams in Germany: A Nationwide Survey

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Psychological safety (PS) is essential for teamwork, communication, and patient safety in complex healthcare environments. In pediatric oncology, interprofessional collaboration occurs under high emotional and organizational demands. Low PS may increase stress, burnout, and adverse events.
Alexandros Rahn   +4 more
wiley   +1 more source

Comparison of the Corrosion Behavior of Brass in TiO2 and Al2O3 Nanofluids

open access: yesNanomaterials, 2020
The corrosion behavior of brass in TiO2 and Al2O3 nanofluids using a simulated cooling water (SCW) as the base solution and sodium dodecyl benzene sulfonate (SDBS) as the dispersant was studied by electrochemical measurements and surface analysis in this
Siyu Xie   +6 more
doaj   +1 more source

Proposal to Complex DES Security Using Diffie Hellman Injection [PDF]

open access: yesEngineering and Technology Journal, 2011
Data Encryption Standard (DES) is based on a round of starters, from the results of the use of multi-stage permutation and replacement to the more complex algorithm which adopts the symmetric key.
Shatha habeeb Jafar
doaj   +1 more source

Multi-factor Authenticated Key Exchange [PDF]

open access: yes, 2008
In order to increase the security for authenticated key exchange protocols, various authentication means can be used together. In this paper, we introduce a security model for multi-factor authenticated key exchange, which combines a password, a secure device, and biometric authentications.
Pointcheval, David, Zimmer, Sébastien
openaire   +2 more sources

Enteropathogenic E. coli shows delayed attachment and host response in human jejunum organoid‐derived monolayers compared to HeLa cells

open access: yesFEBS Letters, EarlyView.
Enteropathogenic E. coli (EPEC) infects the human intestinal epithelium, resulting in severe illness and diarrhoea. In this study, we compared the infection of cancer‐derived cell lines with human organoid‐derived models of the small intestine. We observed a delayed in attachment, inflammation and cell death on primary cells, indicating that host ...
Mastura Neyazi   +5 more
wiley   +1 more source

DAGS: Key encapsulation using dyadic GS codes

open access: yesJournal of Mathematical Cryptology, 2018
Code-based cryptography is one of the main areas of interest for NIST’s Post-Quantum Cryptography Standardization call. In this paper, we introduce DAGS, a Key Encapsulation Mechanism (KEM) based on quasi-dyadic generalized Srivastava codes.
Banegas Gustavo   +12 more
doaj   +1 more source

Home - About - Disclaimer - Privacy