Results 91 to 100 of about 22,218,864 (289)
Hardware-based Security for Virtual Trusted Platform Modules
Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to the hardware-based TPMs to allow the use of their cryptographic functionalities in scenarios where multiple TPMs are required in a single platform, such as in ...
Alsouri, Sami +3 more
core
This article presents the design and evaluation of a gas‐control jacket integrated with a breathable shake flask, enabling precise regulation of dissolved oxygen and carbon dioxide to improve scalability, process control, and culture performance in shaking bioreactors.
Vikash Kumar +5 more
wiley +1 more source
Year 2010 Issues on Cryptographic Algorithms [PDF]
In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions.
Masashi Une, Masayuki Kanda
core
Sentience in cephalopod molluscs: an updated assessment
ABSTRACT This article evaluates the evidence for sentience – the capacity to have feelings – in cephalopod molluscs: octopus, cuttlefish, squid, and nautilus. Our framework includes eight criteria, covering both whether the animal's nervous system could support sentience and whether their behaviour indicates sentience.
Alexandra K. Schnell +4 more
wiley +1 more source
A Comparison of the Standardized Versions of ECIES [PDF]
Elliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures or performing key exchanges. In relation to encryption, the Elliptic Curve Integrated Encryption Scheme (ECIES) is the best known scheme based on ECC,
Gayoso Martínez, Víctor +3 more
core
Regulation Through Revelation: The Effect of Pollution Monitoring on Labour Demand
ABSTRACT This paper investigates how manufacturing firms respond to a real‐time pollution monitoring programme, with a focus on the implication for employment. Contrary to the conventional expectation that environmental regulations negatively impact business, the findings reveal that enhanced pollution monitoring has a significant and robust positive ...
Tong Zhu, Andreas Löschel
wiley +1 more source
Precise boundary element method for non-horizontally layered foundations and its applications
A new boundary element method (BEM) is developed for accurately calculating the additional stresses and settlements in non-horizontally layered foundations.
XIAO Sha 1 , YUE Zhongqi 2, 3
doaj +1 more source
Session Initiation Protocol Attacks and Challenges
In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP).
Keshavarz, Hassan +2 more
core
Under an alternating electric field, the lithiated halloysite nanotubes (HNTs–SO₃Li) self‐assemble into a perpendicular orientation, creating continuous pathways with low tortuosity that markedly enhance room‐temperature ionic conductivity. The shortened diffusion path within this alignment enables rapid Li⁺ transport, while the establishment of a ...
Sha Peng +7 more
wiley +1 more source

