Results 121 to 130 of about 6,293,788 (277)

Open Sesame! Design and Implementation of Backdoor to Secretly Unlock Android Devices

open access: yesJournal of Internet Services and Information Security, 2017
This paper presents a practical design of backdoor to permanently bypass the screen lock mechanisms on Android devices. Our design has many advantages such as difficulty in detecting backdoor, fast execution time and low power consumption.
Junsung Cho   +3 more
doaj   +1 more source

Origins of female genital diversity: Predation risk and lock‐and‐key explain rapid divergence during an adaptive radiation

open access: yesEvolution; international journal of organic evolution, 2015
The study of male genital diversity has long overshadowed evolutionary inquiry of female genitalia, despite its nontrivial diversity. Here, we identify four nonmutually exclusive mechanisms that could lead to genital divergence in females, and ...

semanticscholar   +1 more source

Design And Analysis Of Auto Security Door Locking System [PDF]

open access: yes, 2016
Mortise locks are generally used for exterior doors due to its high durability in sustaining the security level of house access systems. This type of door lock systems have been implemented on all kinds of houses for more than 70 years.
Lim, Si Qing
core  

Analysis of user behavior and authorization methods in context of mobile devices security

open access: yesJournal of Computer Sciences Institute, 2018
This article discusses authentication methods for users of mobile devices with touchscreens. The analysis concerns the authentication methods already existing in Android OS and new authorization methods proposed by the authors.
Piotr Król, Damian Marek, Jakub Smołka
doaj   +1 more source

Enhancing a Lock-and-Key Scheme With MTE to Mitigate Use-After-Frees

open access: yesIEEE Access
Preventing Use-After-Free (UAF) bugs is crucial to ensure temporal memory safety. Against UAF attacks, much research has adopted a well-known approach, lock-and-key, in which unique, disposable locks and keys are first assigned respectively to objects ...
Inyoung Bang   +5 more
doaj   +1 more source

Logic Locking for Secure Outsourced Chip Fabrication: A New Attack and Provably Secure Defense Mechanism [PDF]

open access: yesarXiv, 2017
Chip designers outsource chip fabrication to external foundries, but at the risk of IP theft. Logic locking, a promising solution to mitigate this threat, adds extra logic gates (key gates) and inputs (key bits) to the chip so that it functions correctly only when the correct key, known only to the designer but not the foundry, is applied.
arxiv  

A multi-lock inhibitory mechanism for fine-tuning enzyme activities of the HECT family E3 ligases

open access: yesNature Communications, 2019
HECT type E3 ligases are key regulators of cell growth and proliferation. Here the authors present the crystal structures of the Nedd4 family E3 ligase WWP1 in a closed and semi-open state and in combination with mutagenesis experiments identify a multi ...
Zhen Wang   +9 more
doaj   +1 more source

Home - About - Disclaimer - Privacy