Results 31 to 40 of about 849,579 (245)
Secure and fast mobility handover scheme for IoMT in 5 G and future 6 G networks
The emergence of 5 G and 6 G networks promises significant advancements in the Internet of Medical Things (IoMT) by enabling real-time medical data transmission and continuous connectivity for mobile healthcare devices. However, traditional Handover (HO) mechanisms face latency, security, energy consumption, and scalability challenges when supporting ...
Shayla Islam +9 more
openaire +2 more sources
Seamless and Secure VR: Adapting and Evaluating Established Authentication Systems for Virtual Reality [PDF]
Virtual reality (VR) headsets are enabling a wide range of new opportunities for the user. For example, in the near future users may be able to visit virtual shopping malls and virtually join international conferences.
Alt, Florian +6 more
core +1 more source
Remote Monitoring in Myasthenia Gravis: Exploring Symptom Variability
ABSTRACT Background Myasthenia gravis (MG) is a rare, autoimmune disorder characterized by fluctuating muscle weakness and potential life‐threatening crises. While continuous specialized care is essential, access barriers often delay timely interventions. To address this, we developed MyaLink, a telemedical platform for MG patients.
Maike Stein +13 more
wiley +1 more source
Adaptive authentication and key agreement mechanism for future cellular systems [PDF]
Since the radio medium can be accessed by anyone, authentication of users is a very important element of a mobile network. Nowadays, in GSM/GPRS a challenge response protocol is used to authenticate the user to the mobile network.
Dimitriou, T., Komninos, N.
core
Secure agent data integrity shield [PDF]
In the rapidly expanding field of E-Commerce, mobile agent is the emerging technology that addresses the requirement of intelligent filtering/processing of information. This paper will address the area of mobile agent data integrity protection.
Borselius +15 more
core +1 more source
Objective The aim of this systematic review was to synthesize the economic impact of rheumatoid arthritis (RA) on households, health systems, and society in low‐ and middle‐income countries (LMICs). Methods Electronic databases such as PubMed, Web of Science, and CINAHL were searched using keywords related to RA and cost of illness.
Tadesse Gebrye +6 more
wiley +1 more source
Influencing Factors to mHealth Uptake With Indigenous Populations: Qualitative Systematic Review
BackgroundThe advancements and abundance of mobile phones and portable health devices have created an opportunity to use mobile health (mHealth) for population health systems.
Andrew Goodman +3 more
doaj +1 more source
Changing users' security behaviour towards security questions: A game based learning approach
Fallback authentication is used to retrieve forgotten passwords. Security questions are one of the main techniques used to conduct fallback authentication. In this paper, we propose a serious game design that uses system-generated security questions with
Arachchilage, Nalin Asanka Gamagedara +1 more
core +1 more source
Spectrum sharing security and attacks in CRNs: a review [PDF]
Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics.
Alhakami, Wajdi +2 more
core +3 more sources
Objective We conducted formative research aimed at identifying solutions that address inequitable health outcomes in lupus due to adverse social determinants of health (SDoH). Methods We conducted a search for keywords, which provided insights into potential solutions and initiatives underway. An advisory panel of lupus experts iteratively reviewed the
Joy Buie +11 more
wiley +1 more source

