Results 51 to 60 of about 3,148 (188)
Abstract Nurses working in emergency departments in the United States are increasingly managing obstetric emergencies, yet they receive no guidance from hospital administrators about how to adapt this care to the abortion bans that have recently become law in many states.
Lynnette Arnold +2 more
wiley +1 more source
Novel Schemes for Authentication [PDF]
Authentication is one of the most basic process to provide security to any resource and application from unauthorized access. It covers two security goals confidentiality and integrity. Passwords are used as private identity for an individual.
Gupta, Vikash Kumar
core
Algorithm Diversity for Resilient Systems
Diversity can significantly increase the resilience of systems, by reducing the prevalence of shared vulnerabilities and making vulnerabilities harder to exploit.
A Avizienis +10 more
core +1 more source
Collusion defender : preserving subscribers’ privacy in publish and subscribe systems [PDF]
The Publish and Subscribe (pub/sub) system is an established paradigm to disseminate the data from publishers to subscribers in a loosely coupled manner using a network of dedicated brokers.
Asghar, MR +4 more
core +2 more sources
Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan +2 more
wiley +1 more source
Notes on a lattice-based proxy-oriented identity-based encryption with keyword search [PDF]
Zhang et al. recently proposed a lattice-based proxy-oriented identity-based encryption with keyword search (PO-IBEKS) at Information Sciences in 2019. They claimed that their scheme can resist insider keyword guessing attacks by preventing cloud server ...
Cheng-Yi Lee +3 more
core
Agents' Behavior and Interest Rate Model Optimization in DeFi Lending
ABSTRACT Contrasting sharply with traditional money, bond, and bond futures markets, where interest rates emerge organically from participant interactions, DeFi lending platforms employ rule‐based interest rates that are algorithmically set. Thus, the selection of an effective interest rate model (IRM) is paramount for the success of a lending protocol.
Charles Bertucci +4 more
wiley +1 more source
ABSTRACT Pulses offer significant nutritional and environmental benefits and are useful components of healthier, more sustainable diets and global food security. However, their consumption in France remains low and below the world average. Farmers face economic and technical challenges in diversifying crops, and current domestic production is ...
Gaëlle Arvisenet +7 more
wiley +1 more source
A certificateless and KGA-secure searchable encryption scheme with constant trapdoors in smart city
Smart cities, as a typical application in the field of the Internet of Things, can combine cloud computing to realize the intelligent control of objects and process massive data.
Hongjun Li +4 more
doaj +1 more source
Abstract INTRODUCTION This paper presents the development of a framework to assess the use and experiences of non‐pharmacological interventions (NPIs) supporting sleep, including technological and indoor environmental quality (IEQ) measures. Sleep disturbances are common in people with dementia (PwD) and increase caregiver burden.
CAM Huisman, MGLC Loomans, HSM Kort
wiley +1 more source

