Results 81 to 90 of about 911,528 (286)
This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ...
Erritali, Mohammed +2 more
core +1 more source
Developing recyclable materials for magnetic robotics that combine rapid response and self‐healing properties is challenging. Hence, this study focuses on the integration of magnetothermal nanoparticles into a dynamic sorbitol‐based vitrimer, a recyclable composite capable of remote actuation and self‐healing by magnetic heating.
Maria Weißpflog +3 more
wiley +1 more source
This work provides a series of fire tests in a 1/7 model tunnel to explore the influence of portal-blocking speed on tunnel fire behaviors. Burning rate, ceiling temperature, temperature distribution inside tunnel and thermal characteristic near tunnel ...
Xi Zhang +6 more
doaj +1 more source
Security Issues in Mobile Payment from the Customer Viewpoint [PDF]
The perception of mobile payment procedures’ security by the customer is one major factor for the market breakthrough of the according systems. In this paper we examine security issues in mobile payment from the viewpoint of customers.
Linck, K. +2 more
core +1 more source
Adaptive authentication and key agreement mechanism for future cellular systems [PDF]
Since the radio medium can be accessed by anyone, authentication of users is a very important element of a mobile network. Nowadays, in GSM/GPRS a challenge response protocol is used to authenticate the user to the mobile network.
Dimitriou, T., Komninos, N.
core
A novel thermos‐responsive hydroxypropyl cellulose/graphene oxide (HPC/GO) composite membrane is fabricated for reversible temperature‐gated ion transport in aqueous zinc‐ion batteries. Enabled by LCST‐driven structural transition, unimpeded ion diffusion at room temperature delivers high capacity, while elevated temperature suppresses transport; full ...
Xueli Bi +9 more
wiley +1 more source
Deployment of Keystroke Analysis on a Smartphone [PDF]
The current security on mobile devices is often limited to the Personal Identification Number (PIN), a secretknowledge based technique that has historically demonstrated to provide ineffective protection from misuse.
Buchoux, A, Clarke, Nathan
core +1 more source
This paper presents a digital microfluidics‐based technique for transferring and reconfiguring soft nanomembranes. Laser‐machined nanothin membranes are picked up, transported, and aligned via tailored surface tension and the actuation of water droplets, enabling the development of flexible electronics, the integration of functional materials on 3D ...
Quang Anh Nguyen +15 more
wiley +1 more source
Mobile Ad hoc Network (MANET) is a collection of mobile nodes that can communicate with each other using multihop wireless links without requiring any fixed based-station infrastructure and centralized management.
Aggarwal, Akshai +4 more
core +1 more source
Laser‐Assisted Processing and Modification of Bioactive Glasses: A Review
Laser technologies provide powerful tools to process and transform bioactive glasses for advanced biomedical applications. This review discusses laser‐matter interaction mechanisms, laser surface engineering, and laser‐assisted fabrication of scaffolds and nanofibers.
Antonio Riveiro +8 more
wiley +1 more source

