Results 91 to 100 of about 64,904 (211)

A Non-imaging High Throughput Approach to Chemical Library Screening at the Unmodified Adenosine-A3 Receptor in Living Cells

open access: yesFrontiers in Pharmacology, 2017
Recent advances in fluorescent ligand technology have enabled the study of G protein-coupled receptors in their native environment without the need for genetic modification such as addition of N-terminal fluorescent or bioluminescent tags.
Maria Augusta Arruda   +11 more
doaj   +1 more source

TLS in the wild: an Internet-wide analysis of TLS-based protocols for electronic communication

open access: yes, 2016
The majority of electronic communication today happens either via email or chat. Thanks to the use of standardised protocols electronic mail (SMTP, IMAP, POP3) and instant chat (XMPP, IRC) servers can be deployed in a decentralised but interoperable ...
Amann, Johanna   +4 more
core   +1 more source

PERANAN SURAT KABAR SOERAPATI DALAM PERLAWANAN INTELEKTUAL PRIBUMI DI JAWA BARAT TAHUN 1923-1925

open access: yesPatanjala: Jurnal Penelitian Sejarah dan Budaya, 2016
Abstrak Perlawanan intelektual pribumi yang dilakukan oleh organisasi berideologi komunis menggunakan beberapa media, diantaranya surat kabar Soerapati. Metode yang digunakan adalah metode sejarah yang terdiri atas empat tahapan kerja: heuristik, kritik,
Dharyanto Tito Wardani
doaj   +1 more source

Initial Experiences of Building Secure Access to Patient Confidential Data via the Internet [PDF]

open access: yes, 2000
A project to enable health care professionals (GPs, practice nurses and diabetes nurse specialists) to access, via the Internet, confidential patient data held on a secondary care (hospital) diabetes information system, has been implemented.
Chadwick, David W.   +3 more
core  

New Ethereum-based distributed PKI with a reward-and-punishment mechanism

open access: yesBlockchain: Research and Applications
This paper explores the critical role of Public Key Infrastructure (PKI) in ensuring the security of electronic transactions, particularly in validating the authenticity of websites in online environments.
Chong-Gee Koa   +2 more
doaj   +1 more source

Triskelion—In Pursuit of Proficiency Through Immersive Gameplay

open access: yesInformation
As technology advances, interest in video games is extending to broader audiences. This makes gamification as a mechanism for improving educational outcomes increasingly attractive.
Victor Winter
doaj   +1 more source

Securing reactive routing protocols in MANETs using PKI (PKI‐DSR)

open access: yesSecurity and Communication Networks, 2008
AbstractMobile Ad hoc Networks (MANETs) are deployed in many new domestic and public applications, contributing to new requirements in terms of performance and efficiency. However due to their nature, some usual network services such as routing and security are not carried out as well as expected.
Benamar Kadri   +2 more
openaire   +1 more source

A note on SPKI's authorisation syntax [PDF]

open access: yes, 2002
Tuple reduction is the basic mechanism used in SPKI to make authorisation decisions. A basic problem with the SPKI authorisation syntax is that straightforward implementations of tuple reduction are quadratic in both time and space.
Bandmann, Olav, Dam, Mads
core   +1 more source

Convexity preserving interpolatory subdivision with conic precision [PDF]

open access: yes, 2010
The paper is concerned with the problem of shape preserving interpolatory subdivision. For arbitrarily spaced, planar input data an efficient non-linear subdivision algorithm is presented that results in $G^1$ limit curves, reproduces conic sections and ...
Gudrun Albrecht   +5 more
core  

PENELITIAN STUDI KASUS FENOMENOLOGI PERSEPSI KEADILAN PELAKU PEMBUNUHAN ANGGOTA PKI 1965

open access: yesJurnal Sains Psikologi, 2017
Penelitian ini bertujuan untuk mendeskripsikan persepsi keadilan pelaku pembunuhan anggota PKI tahun 1965. Rancangan penelitian yang digunakan adalah kualitatif dengan model studi kasus fenomenologi.
Kukuh Setyo Pambudi   +1 more
doaj  

Home - About - Disclaimer - Privacy