Results 31 to 40 of about 849,579 (245)

Secure and fast mobility handover scheme for IoMT in 5 G and future 6 G networks

open access: yesAlexandria Engineering Journal
The emergence of 5 G and 6 G networks promises significant advancements in the Internet of Medical Things (IoMT) by enabling real-time medical data transmission and continuous connectivity for mobile healthcare devices. However, traditional Handover (HO) mechanisms face latency, security, energy consumption, and scalability challenges when supporting ...
Shayla Islam   +9 more
openaire   +2 more sources

Seamless and Secure VR: Adapting and Evaluating Established Authentication Systems for Virtual Reality [PDF]

open access: yes, 2017
Virtual reality (VR) headsets are enabling a wide range of new opportunities for the user. For example, in the near future users may be able to visit virtual shopping malls and virtually join international conferences.
Alt, Florian   +6 more
core   +1 more source

Remote Monitoring in Myasthenia Gravis: Exploring Symptom Variability

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Myasthenia gravis (MG) is a rare, autoimmune disorder characterized by fluctuating muscle weakness and potential life‐threatening crises. While continuous specialized care is essential, access barriers often delay timely interventions. To address this, we developed MyaLink, a telemedical platform for MG patients.
Maike Stein   +13 more
wiley   +1 more source

Adaptive authentication and key agreement mechanism for future cellular systems [PDF]

open access: yes, 2006
Since the radio medium can be accessed by anyone, authentication of users is a very important element of a mobile network. Nowadays, in GSM/GPRS a challenge response protocol is used to authenticate the user to the mobile network.
Dimitriou, T., Komninos, N.
core  

Secure agent data integrity shield [PDF]

open access: yes, 2004
In the rapidly expanding field of E-Commerce, mobile agent is the emerging technology that addresses the requirement of intelligent filtering/processing of information. This paper will address the area of mobile agent data integrity protection.
Borselius   +15 more
core   +1 more source

Economic Burden of Rheumatoid Arthritis in Low‐ and Middle‐Income Countries: Systematic Review and Meta‐Analysis

open access: yesArthritis Care &Research, EarlyView.
Objective The aim of this systematic review was to synthesize the economic impact of rheumatoid arthritis (RA) on households, health systems, and society in low‐ and middle‐income countries (LMICs). Methods Electronic databases such as PubMed, Web of Science, and CINAHL were searched using keywords related to RA and cost of illness.
Tadesse Gebrye   +6 more
wiley   +1 more source

Influencing Factors to mHealth Uptake With Indigenous Populations: Qualitative Systematic Review

open access: yesJMIR mHealth and uHealth, 2023
BackgroundThe advancements and abundance of mobile phones and portable health devices have created an opportunity to use mobile health (mHealth) for population health systems.
Andrew Goodman   +3 more
doaj   +1 more source

Changing users' security behaviour towards security questions: A game based learning approach

open access: yes, 2017
Fallback authentication is used to retrieve forgotten passwords. Security questions are one of the main techniques used to conduct fallback authentication. In this paper, we propose a serious game design that uses system-generated security questions with
Arachchilage, Nalin Asanka Gamagedara   +1 more
core   +1 more source

Spectrum sharing security and attacks in CRNs: a review [PDF]

open access: yes, 2014
Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics.
Alhakami, Wajdi   +2 more
core   +3 more sources

Identifying High‐Impact Solutions to Address Racial and Ethnic Health Disparities in Lupus: A Consensus‐Based Approach

open access: yesArthritis Care &Research, EarlyView.
Objective We conducted formative research aimed at identifying solutions that address inequitable health outcomes in lupus due to adverse social determinants of health (SDoH). Methods We conducted a search for keywords, which provided insights into potential solutions and initiatives underway. An advisory panel of lupus experts iteratively reviewed the
Joy Buie   +11 more
wiley   +1 more source

Home - About - Disclaimer - Privacy