Results 181 to 190 of about 61,999 (289)
Hybrid cryptographic approach for strengthening IoT and 5G/B5G network security. [PDF]
Kumar A, Singh P, Kamble DP, Singh I.
europepmc +1 more source
Abstract Chronic illness represents a transition for both patients and their family members although transitions and information behavior changes have largely been explored from an individual perspective. Illness‐related transitions may be undertaken individually or collectively, but little is known about how family information networks change in the ...
Lindsay K. Brown, Tiffany C. Veinot
wiley +1 more source
A hybrid multi-node QKD-ECC architecture for securing IoT networks. [PDF]
Chaturvedi R +7 more
europepmc +1 more source
Abstract In today's digital age, misinformation propagates rapidly through digital channels, blurring the lines between truth and fiction, and challenging the foundations of trust in information sources. Although affecting all spheres of life, misinformation poses a significant threat to workers highlighting a critical intersection between ...
Ashwani Malhotra +4 more
wiley +1 more source
Linkable Ring Signature for Privacy Protection in Blockchain-Enabled IIoT. [PDF]
Guo F +5 more
europepmc +1 more source
Abstract Institutional repositories (IRs) are essential in advancing Open Access and facilitating the dissemination of scholarly work. This systematic review examines the challenges faced by IRs in areas such as strategic alignment, content acquisition, funding, staffing, quality assurance, and technology.
Laura Rothfritz +3 more
wiley +1 more source
WAWA: Wavelet Analysis-Based Watermarking Authentication for GNSS Civil Signal with Immediate Symbol-Level Verification. [PDF]
Tang X, Tang X, Lin H, Wu Y, Sun G.
europepmc +1 more source
ABSTRACT This preregistered study examined whether the gender identity phenotype differs between autistic and non‐autistic children and adolescents, as well as whether gender identity traits aggregate similarly within their families. Study 1 involved four matched groups of autistic and non‐autistic gender diverse youth referred to a UK specialist ...
Matthew C. Fysh +4 more
wiley +1 more source
Lightweight Quantum Authentication and Key Agreement Scheme in the Smart Grid Environment. [PDF]
Jiang Z, Shi RH.
europepmc +1 more source

