Results 191 to 200 of about 319,858 (317)
Abstract In recent years, there has been a growing trend toward the digitization of education, highlighting the need to understand how different learning modalities impact medical student outcomes. This study analyzes user behavior among medical students in Microscopic Anatomy, focusing on preferences for digital versus face‐to‐face guided self‐study ...
Morris Gellisch+7 more
wiley +1 more source
Ethernet Passive Mutual Authentication Scheme on Quantum Networks. [PDF]
Tian J, Qin P, Zhao Z, Qin B.
europepmc +1 more source
Evolving stories of self: Informational transitions and tattoos
Abstract Throughout history, tattoos have served as a means of expressing identity, culture, and preserving information. Beyond their visual appeal, tattoos continue to be used in the modern world as a way for individuals to showcase their identity, honor and remember others, and mark significant events. In this paper, we explore the connection between
Maja Krtalić+2 more
wiley +1 more source
A novel method for generating public keys involving matrix operations. [PDF]
Sun X, Han J, Lv B, Sun C, Zeng C.
europepmc +1 more source
Abstract This paper reports on findings from 15 semi‐structured interviews with LGBTQIA+ individuals within the United States who have experienced the loss of one or more LGBTQIA+ information spaces. The paper specifically focuses on how such losses occurred and the information transitions experienced by the participants in response to this loss ...
Travis L. Wagner, Vanessa L. Kitzie
wiley +1 more source
Prediction of android ransomware with deep learning model using hybrid cryptography. [PDF]
Kalphana KR+7 more
europepmc +1 more source
Abstract Chronic illness represents a transition for both patients and their family members although transitions and information behavior changes have largely been explored from an individual perspective. Illness‐related transitions may be undertaken individually or collectively, but little is known about how family information networks change in the ...
Lindsay K. Brown, Tiffany C. Veinot
wiley +1 more source
Efficient Elliptic-Curve-Cryptography-Based Anonymous Authentication for Internet of Things: Tailored Protocols for Periodic and Remote Control Traffic Patterns. [PDF]
Hu S, Zhang Y, Guo Y, Chen Y, Chen L.
europepmc +1 more source
Abstract Using intersectionality as a critical theoretical framework and analytical tool, this study investigated the HIV/AIDS information practices of Black sexual minority men (SMM). Twenty‐two Black SMM were interviewed about their HIV/AIDS‐related information practices.
Megan Threats
wiley +1 more source
EAIA: An Efficient and Anonymous Identity-Authentication Scheme in 5G-V2V. [PDF]
Du Q, Zhou J, Ma M.
europepmc +1 more source