Results 11 to 20 of about 212,137 (199)
Timed Analysis of Security Protocols [PDF]
We propose a method for engineering security protocols that are aware of timing aspects. We study a simplified version of the well-known Needham Schroeder protocol and the complete Yahalom protocol, where timing information allows the study of different ...
Corin, R. +3 more
core +11 more sources
Prevalence, Reasons for Use, and Risk Perception of Electronic Cigarettes among Post-Acute Coronary Syndrome Smokers [PDF]
Purpose—The use of electronic cigarettes (e-cigarettes) has risen dramatically in recent years. However, there is currently no published data on use of e-cigarettes among cardiac patients. The current study reports on the prevalence, reasons for use, and
Busch, Andrew M., Tooley, Erin M.
core +2 more sources
On the Security of an Efficient and Robust Certificateless Signature Scheme for IIoT Environments
As the progress of digitization in industrial society, large amount of production data are outsourced to the cloud server in order to reduce data management costs. Nevertheless, how to ensure the outsourced data integrality, validity, and availability is
Wenjie Yang +3 more
doaj +1 more source
Some Physics And System Issues In The Security Analysis Of Quantum Key Distribution Protocols [PDF]
In this paper we review a number of issues on the security of quantum key distribution (QKD) protocols that bear directly on the relevant physics or mathematical representation of the QKD cryptosystem.
Yuen, Horace P.
core +1 more source
A trustworthy mobile agent infrastructure for network management [PDF]
Despite several advantages inherent in mobile-agent-based approaches to network management as compared to traditional SNMP-based approaches, industry is reluctant to adopt the mobile agent paradigm as a replacement for the existing manager-agent model ...
Koliousis, A., Sventek, J.S.
core +1 more source
PROVIDE: hiding from automated network scans with proofs of identity [PDF]
Network scanners are a valuable tool for researchers and administrators, however they are also used by malicious actors to identify vulnerable hosts on a network. Upon the disclosure of a security vulnerability, scans are launched within hours.
Bestavros, Azer, Koch, William
core +3 more sources
We introduce a simple, practical approach with probabilistic information-theoretic security to mitigate one of quantum key distribution's major limitations: the short maximum transmission distance (~200 km) possible with present day technology.
A. Herzberg +9 more
core +2 more sources
Security analysis and improvement of strongly secure certificate less signature scheme
By analyzing the security of strongly secure certificateless signature scheme proposed by Wang Yafei et al, the problem that the scheme could not resist public key replacement attack under dishonest KGC was pointed out.
Ai-wan FAN, Zhao-feng YANG, Li-ming XIE
doaj +2 more sources
In Vehicular Ad-Hoc Networks (VANETs), a Certificateless Aggregate Signature (CLAS) scheme with a conditional anonymity authentication meets both anonymity and security requirements.
Abdelkrim Imghoure +2 more
doaj +1 more source
Correlation of the differential expression of PIK3R1 and its spliced variant, p55α, in pan‐cancer
PIK3R1 undergoes alternative splicing to generate the isoforms, p85α and p55α. By combining large patient datasets with laboratory experiments, we show that PIK3R1 spliced variants shape cancer behavior. While tumors lose the protective p85α isoform, p55α is overexpressed, changes linked to poorer survival and more pronounced in African American ...
Ishita Gupta +10 more
wiley +1 more source

