Results 51 to 60 of about 319,858 (317)
An Owner-managed Indirect-Permission Social Authentication Method for Private Key Recovery [PDF]
In this paper, we propose a very secure and reliable owner-self-managed private key recovery method. In recent years, Public Key Authentication (PKA) method has been identified as the most feasible online security solution. However, losing the private key also implies the risk of losing the ownership of the assets associated with the private key.
arxiv
Secure E-Mail System Using S/Mime and Ib-Pkc [PDF]
Although e-mail security solutions have been introduced formore than two decades, most of the e-mail messages are sent nowadayswithout being secured by any of these techniques.
Sufyan Faraj, Mohammed Ibrahem
doaj +1 more source
SECURE E-MAIL SYSTEM USING S/MIME AND IB-PKC [PDF]
Although e-mail security solutions have been introduced for more than two decades, most of the e-mail messages are sent nowadays without being secured by any of these techniques.
MOHAMMED T. IBRAHEM, SUFYAN T. FARAJ
doaj +1 more source
RETRACTED: Parallel Encryption With Digit Arithmetic Of Covertext Model Using Duplicated Covertext
Steganography is the art and science of writing hidden messages or hiding messages in such a way that, apart from the sender and the recipient, no one knows or is aware that there is a secret message (it does not appear that there is a hidden message ...
Hari Murti+3 more
doaj +1 more source
Transmission factors and exposure to infections at work and invasive pneumococcal disease
Abstract Background Working in close contacts with coworkers or the general public may be associated with transmission of invasive pneumococcal disease (IPD). We investigated whether crowded workplaces, sharing surfaces, and exposure to infections were factors associated with IPD.
Kjell Torén+4 more
wiley +1 more source
A Comparison of Security and its Performance for Key Agreements in Post-Quantum Cryptography
Nowadays, we are surrounded by devices collecting and transmitting private information. Currently, the two main mathematical problems that guarantee security on the Internet are the Integer Factorization Problem and the Discrete Logarithm Problem ...
Fábio Borges+2 more
semanticscholar +1 more source
Abstract Background The Occupational Safety and Health Administration (OSHA) implemented a new standard in 2014 requiring employers to report nearly all work‐related inpatient hospitalizations within 24 h of the event. We examined the characteristics of the injured workers who were reported and the compliance of Michigan employers with the regulation ...
Mary Jo Reilly+2 more
wiley +1 more source
Abstract Children and other vulnerable parties such as those with a cognitive, social or communication impairment frequently struggle to understand, and be understood in, the criminal justice environment. One way this has been addressed in jurisdictions around Australia and overseas is through the introduction of intermediary (or communication partner)
Sarah Hoff, Martine Powell, David Plater
wiley +1 more source
Small Private Key MQPKS on an Embedded Microprocessor
Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources.
Hwajeong Seo+5 more
doaj +1 more source
Abstract Background This study aims to develop a novel predictive model for determining human papillomavirus (HPV) presence in oropharyngeal cancer using computed tomography (CT). Current image‐based HPV prediction methods are hindered by high computational demands or suboptimal performance.
Junhua Chen+3 more
wiley +1 more source