Results 101 to 110 of about 6,477,960 (317)
Authentication and Delegation for Operating a Multi-Drone System
As the era of IoT comes, drones are in the spotlight as a mobile medium of Internet of Things (IoT) devices and services. However, drones appear to be vulnerable to physical capture attacks since they usually operate far from operators.
Mungyu Bae, Hwangnam Kim
doaj +1 more source
Dynamic coefficient symmetric polynomial-based secure key management scheme for Internet of Things (IoT) networks. [PDF]
Liu Z, Luo Y.
europepmc +1 more source
PARP inhibitors are used to treat a small subset of prostate cancer patients. These studies reveal that PARP1 activity and expression are different between European American and African American prostate cancer tissue samples. Additionally, different PARP inhibitors cause unique and overlapping transcriptional changes, notably, p53 pathway upregulation.
Moriah L. Cunningham +21 more
wiley +1 more source
Butterfly Encryption Scheme for Resource-Constrained Wireless Networks
Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed.
Raghav V. Sampangi, Srinivas Sampalli
doaj +1 more source
Software-Defined Networking Orchestration for Interoperable Key Management of Quantum Key Distribution Networks. [PDF]
Sim DH, Shin J, Kim MH.
europepmc +1 more source
A Study on Secure Group Key Management Based on Agent for Multicast Data Transmission [PDF]
Bo-Seung Kim +3 more
openalex +1 more source
This study explores salivary RNA for breast cancer (BC) diagnosis, prognosis, and follow‐up. High‐throughput RNA sequencing identified distinct salivary RNA signatures, including novel transcripts, that differentiate BC from healthy controls, characterize histological and molecular subtypes, and indicate lymph node involvement.
Nicholas Rajan +9 more
wiley +1 more source
Attack Algorithm for a Keystore-Based Secret Key Generation Method
A new attack algorithm is proposed for a secure key generation and management method introduced by Yang and Wu. It was previously claimed that the key generation method of Yang and Wu using a keystore seed was information-theoretically secure and could ...
Seungjae Chae +3 more
doaj +1 more source
Provably Secure Receiver-Unrestricted Group Key Management Scheme for Mobile Ad Hoc Networks. [PDF]
Zhang R, Han W, Zhang L, Wang L, Meng X.
europepmc +1 more source

