Results 41 to 50 of about 1,662,639 (284)
Security risk assessment and protection in the chemical and process industry [PDF]
This article describes a security risk assessment and protection methodology that was developed for use in the chemical- and process industry in Belgium. The approach of the method follows a risk-based approach that follows desing principles for chemical
American Petroleum Institute +19 more
core +1 more source
Translational cancer research and its implementation through competitively selected Comprehensive Cancer Centers across Europe should be the primary policy focus for addressing the increasing cancer burden in Europe and counteract the present main strategy to convert cancer to a chronic disease.
Manuel Heitor +2 more
wiley +1 more source
An amplitude modulator plays an essential role in the implementation of continuous-variable quantum key distribution (CVQKD), whereas it may bring about a potential security loophole in the practical system.
Shengzhe Xu, Zicheng Zhou, Ying Guo
doaj +1 more source
Current research on smart cities is primarily focused on the area of applicability of information and communication technologies. However, in the context of a multidisciplinary approach, it is also necessary to pay attention to the resilience and ...
Martin Hromada +3 more
doaj +1 more source
Quantum cryptography: a practical information security perspective [PDF]
Quantum Key Exchange (QKE, also known as Quantum Key Distribution or QKD) allows communicating parties to securely establish cryptographic keys. It is a well-established fact that all QKE protocols require that the parties have access to an authentic ...
Paterson, Kenneth G. +2 more
core +1 more source
Experimental Measurement-Device-Independent Quantum Key Distribution with Imperfect Sources
Measurement-device-independent quantum key distribution (MDI-QKD), which is immune to all detector side-channel attacks, is the most promising solution to the security issues in practical quantum key distribution systems.
Bedroya, Olinka +4 more
core +1 more source
CRISPRI‐mediated gene silencing and phenotypic exploration in nontuberculous mycobacteria. In this Research Protocol, we describe approaches to control, monitor, and quantitatively assess CRISPRI‐mediated gene silencing in M. smegmatis and M. abscessus model organisms.
Vanessa Point +7 more
wiley +1 more source
Security proof of practical quantum key distribution with detection-efficiency mismatch
Quantum key distribution (QKD) protocols with threshold detectors are driving high-performance QKD demonstrations. The corresponding security proofs usually assume that all physical detectors have the same detection efficiency.
Yanbao Zhang +4 more
doaj +1 more source
Bioscience students were asked for their opinions on the value and teaching of skills. 204 responded that teamwork, time management and study skills are necessary to reach University, that scientific writing, research, laboratory and presentation skills are taught effectively during their studies, while other skills are gained inherently through study ...
Janella Borrell, Susan Crennell
wiley +1 more source
Practical Vulnerability-Information-Sharing Architecture for Automotive Security-Risk Analysis
Emerging trends that are shaping the future of the automotive industry include electrification, autonomous driving, sharing, and connectivity, and these trends keep changing annually.
Yousik Lee +4 more
doaj +1 more source

