Results 91 to 100 of about 22,218,864 (289)

Hardware-based Security for Virtual Trusted Platform Modules

open access: yes, 2013
Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to the hardware-based TPMs to allow the use of their cryptographic functionalities in scenarios where multiple TPMs are required in a single platform, such as in ...
Alsouri, Sami   +3 more
core  

Development of a Jacketed Breathable Shake Flask With Process Monitoring, Control, and Bioreactor‐Like Performance

open access: yesBiotechnology and Bioengineering, EarlyView.
This article presents the design and evaluation of a gas‐control jacket integrated with a breathable shake flask, enabling precise regulation of dissolved oxygen and carbon dioxide to improve scalability, process control, and culture performance in shaking bioreactors.
Vikash Kumar   +5 more
wiley   +1 more source

Year 2010 Issues on Cryptographic Algorithms [PDF]

open access: yes
In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions.
Masashi Une, Masayuki Kanda
core  

Sentience in cephalopod molluscs: an updated assessment

open access: yesBiological Reviews, EarlyView.
ABSTRACT This article evaluates the evidence for sentience – the capacity to have feelings – in cephalopod molluscs: octopus, cuttlefish, squid, and nautilus. Our framework includes eight criteria, covering both whether the animal's nervous system could support sentience and whether their behaviour indicates sentience.
Alexandra K. Schnell   +4 more
wiley   +1 more source

A Comparison of the Standardized Versions of ECIES [PDF]

open access: yes, 2010
Elliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures or performing key exchanges. In relation to encryption, the Elliptic Curve Integrated Encryption Scheme (ECIES) is the best known scheme based on ECC,
Gayoso Martínez, Víctor   +3 more
core  

Regulation Through Revelation: The Effect of Pollution Monitoring on Labour Demand

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT This paper investigates how manufacturing firms respond to a real‐time pollution monitoring programme, with a focus on the implication for employment. Contrary to the conventional expectation that environmental regulations negatively impact business, the findings reveal that enhanced pollution monitoring has a significant and robust positive ...
Tong Zhu, Andreas Löschel
wiley   +1 more source

Precise boundary element method for non-horizontally layered foundations and its applications

open access: yesYantu gongcheng xuebao
A new boundary element method (BEM) is developed for accurately calculating the additional stresses and settlements in non-horizontally layered foundations.
XIAO Sha 1 , YUE Zhongqi 2, 3
doaj   +1 more source

Session Initiation Protocol Attacks and Challenges

open access: yes, 2012
In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP).
Keshavarz, Hassan   +2 more
core  

Vertically Aligned Ion Pathways for Fast Conduction and Uniform Lithium Deposition in Solid‐State Batteries

open access: yesCarbon Energy, EarlyView.
Under an alternating electric field, the lithiated halloysite nanotubes (HNTs–SO₃Li) self‐assemble into a perpendicular orientation, creating continuous pathways with low tortuosity that markedly enhance room‐temperature ionic conductivity. The shortened diffusion path within this alignment enables rapid Li⁺ transport, while the establishment of a ...
Sha Peng   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy