Results 91 to 100 of about 64,904 (211)
Recent advances in fluorescent ligand technology have enabled the study of G protein-coupled receptors in their native environment without the need for genetic modification such as addition of N-terminal fluorescent or bioluminescent tags.
Maria Augusta Arruda +11 more
doaj +1 more source
TLS in the wild: an Internet-wide analysis of TLS-based protocols for electronic communication
The majority of electronic communication today happens either via email or chat. Thanks to the use of standardised protocols electronic mail (SMTP, IMAP, POP3) and instant chat (XMPP, IRC) servers can be deployed in a decentralised but interoperable ...
Amann, Johanna +4 more
core +1 more source
PERANAN SURAT KABAR SOERAPATI DALAM PERLAWANAN INTELEKTUAL PRIBUMI DI JAWA BARAT TAHUN 1923-1925
Abstrak Perlawanan intelektual pribumi yang dilakukan oleh organisasi berideologi komunis menggunakan beberapa media, diantaranya surat kabar Soerapati. Metode yang digunakan adalah metode sejarah yang terdiri atas empat tahapan kerja: heuristik, kritik,
Dharyanto Tito Wardani
doaj +1 more source
Initial Experiences of Building Secure Access to Patient Confidential Data via the Internet [PDF]
A project to enable health care professionals (GPs, practice nurses and diabetes nurse specialists) to access, via the Internet, confidential patient data held on a secondary care (hospital) diabetes information system, has been implemented.
Chadwick, David W. +3 more
core
New Ethereum-based distributed PKI with a reward-and-punishment mechanism
This paper explores the critical role of Public Key Infrastructure (PKI) in ensuring the security of electronic transactions, particularly in validating the authenticity of websites in online environments.
Chong-Gee Koa +2 more
doaj +1 more source
Triskelion—In Pursuit of Proficiency Through Immersive Gameplay
As technology advances, interest in video games is extending to broader audiences. This makes gamification as a mechanism for improving educational outcomes increasingly attractive.
Victor Winter
doaj +1 more source
Securing reactive routing protocols in MANETs using PKI (PKI‐DSR)
AbstractMobile Ad hoc Networks (MANETs) are deployed in many new domestic and public applications, contributing to new requirements in terms of performance and efficiency. However due to their nature, some usual network services such as routing and security are not carried out as well as expected.
Benamar Kadri +2 more
openaire +1 more source
A note on SPKI's authorisation syntax [PDF]
Tuple reduction is the basic mechanism used in SPKI to make authorisation decisions. A basic problem with the SPKI authorisation syntax is that straightforward implementations of tuple reduction are quadratic in both time and space.
Bandmann, Olav, Dam, Mads
core +1 more source
Convexity preserving interpolatory subdivision with conic precision [PDF]
The paper is concerned with the problem of shape preserving interpolatory subdivision. For arbitrarily spaced, planar input data an efficient non-linear subdivision algorithm is presented that results in $G^1$ limit curves, reproduces conic sections and ...
Gudrun Albrecht +5 more
core
PENELITIAN STUDI KASUS FENOMENOLOGI PERSEPSI KEADILAN PELAKU PEMBUNUHAN ANGGOTA PKI 1965
Penelitian ini bertujuan untuk mendeskripsikan persepsi keadilan pelaku pembunuhan anggota PKI tahun 1965. Rancangan penelitian yang digunakan adalah kualitatif dengan model studi kasus fenomenologi.
Kukuh Setyo Pambudi +1 more
doaj

