Results 51 to 60 of about 319,858 (317)

An Owner-managed Indirect-Permission Social Authentication Method for Private Key Recovery [PDF]

open access: yesarXiv, 2022
In this paper, we propose a very secure and reliable owner-self-managed private key recovery method. In recent years, Public Key Authentication (PKA) method has been identified as the most feasible online security solution. However, losing the private key also implies the risk of losing the ownership of the assets associated with the private key.
arxiv  

Secure E-Mail System Using S/Mime and Ib-Pkc [PDF]

open access: yesEngineering and Technology Journal, 2007
Although e-mail security solutions have been introduced formore than two decades, most of the e-mail messages are sent nowadayswithout being secured by any of these techniques.
Sufyan Faraj, Mohammed Ibrahem
doaj   +1 more source

SECURE E-MAIL SYSTEM USING S/MIME AND IB-PKC [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2012
Although e-mail security solutions have been introduced for more than two decades, most of the e-mail messages are sent nowadays without being secured by any of these techniques.
MOHAMMED T. IBRAHEM, SUFYAN T. FARAJ
doaj   +1 more source

RETRACTED: Parallel Encryption With Digit Arithmetic Of Covertext Model Using Duplicated Covertext

open access: yesInspiration, 2022
Steganography is the art and science of writing hidden messages or hiding messages in such a way that, apart from the sender and the recipient, no one knows or is aware that there is a secret message (it does not appear that there is a hidden message ...
Hari Murti   +3 more
doaj   +1 more source

Transmission factors and exposure to infections at work and invasive pneumococcal disease

open access: yesAmerican Journal of Industrial Medicine, Volume 66, Issue 1, Page 65-74, January 2023., 2023
Abstract Background Working in close contacts with coworkers or the general public may be associated with transmission of invasive pneumococcal disease (IPD). We investigated whether crowded workplaces, sharing surfaces, and exposure to infections were factors associated with IPD.
Kjell Torén   +4 more
wiley   +1 more source

A Comparison of Security and its Performance for Key Agreements in Post-Quantum Cryptography

open access: yesIEEE Access, 2020
Nowadays, we are surrounded by devices collecting and transmitting private information. Currently, the two main mathematical problems that guarantee security on the Internet are the Integer Factorization Problem and the Discrete Logarithm Problem ...
Fábio Borges   +2 more
semanticscholar   +1 more source

Evaluation of the characteristics of workers injured on the job requiring hospitalization, and employer compliance with OSHA's reporting requirement for these work‐related hospitalizations

open access: yesAmerican Journal of Industrial Medicine, Volume 66, Issue 2, Page 109-121, February 2023., 2023
Abstract Background The Occupational Safety and Health Administration (OSHA) implemented a new standard in 2014 requiring employers to report nearly all work‐related inpatient hospitalizations within 24 h of the event. We examined the characteristics of the injured workers who were reported and the compliance of Michigan employers with the regulation ...
Mary Jo Reilly   +2 more
wiley   +1 more source

When good intentions are not enough: Professionals’ perceptions of the South Australian communication partner scheme

open access: yesAustralian Journal of Social Issues, Volume 57, Issue 4, Page 970-986, December 2022., 2022
Abstract Children and other vulnerable parties such as those with a cognitive, social or communication impairment frequently struggle to understand, and be understood in, the criminal justice environment. One way this has been addressed in jurisdictions around Australia and overseas is through the introduction of intermediary (or communication partner)
Sarah Hoff, Martine Powell, David Plater
wiley   +1 more source

Small Private Key MQPKS on an Embedded Microprocessor

open access: yesSensors, 2014
Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources.
Hwajeong Seo   +5 more
doaj   +1 more source

Human papillomavirus (HPV) prediction for oropharyngeal cancer based on CT by using off‐the‐shelf features: A dual‐dataset study

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Background This study aims to develop a novel predictive model for determining human papillomavirus (HPV) presence in oropharyngeal cancer using computed tomography (CT). Current image‐based HPV prediction methods are hindered by high computational demands or suboptimal performance.
Junhua Chen   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy