Results 81 to 90 of about 1,980,136 (283)
MULTIFACTOR AUTHENTICATION FOR SOFTWARE PROTECTION
Software protection is a mechanism to make software systems more difficult (or impossible) to be accessed by attackers. Such mechanisms are gaining more importance nowadays for increasing number of attacks on the software systems in the large internet ...
Ali J. Abboud
doaj
Interactive Password Schemes [PDF]
Only the abstract is available for this technical report.Usual password schemes suffer from the flaw that they are easy to steal. An attacker who has correctly observed a login session (by peeping, wiretapping and/or by launching a "man-in-the-middle ...
Itkis, Gene, Maiss, Arwa
core +1 more source
Integrating Segmentation and Paging Protection for Safe, Efficient and Transparent Software Extensions [PDF]
The technological evolution towards extensible software architectures and component-based software development demands safe, efficient, flexible, and easy-touse extension mechanisms to provide protection among software modules residing in the same ...
Prashant Pradhan, Tzi-cker Chiueh
core +1 more source
Pre‐analytical handling critically determines liquid biopsy performance. This study defines practical best‐practice conditions for cell‐free DNA (cfDNA) and extracellular vesicle–derived DNA (evDNA), showing how processing time, storage conditions, tube type, and plasma input volume affect DNA integrity and mutation detection.
Jonas Dohmen +11 more
wiley +1 more source
On Strategic Enabling of Product Piracy in the Market for Video Games [PDF]
In this paper, we consider the market for video games, where some firms are active in both, the market for video games hardware and software. It is puzzling that hardware can be easily made compatible with duplicated (i.e. pirated) software.
Oliver Gürtler
core
Loss of the miR‐214/199a cluster is associated with recurrence in ovarian cancer. Engineered small extracellular vesicles (m214‐sEVs) elevate miR‐214‐3p/miR‐199a‐5p in tumor cells, suppress β‐catenin, TLR4, and YKT6 signaling, reprogram tumor‐derived sEV cargo, reduce chemoresistance and migration, and enhance carboplatin efficacy and survival in ...
Weida Wang +12 more
wiley +1 more source
The Model of System to Counter to Software Tools Learning Code
The article describes the main types of software used for the study of the code, the shortcomings of existing systems of protection programs and proposed a new model of protection system of code.
Anatoliy Petrovich Durakovskiy +1 more
doaj +2 more sources
Digital Rights Management, Intellectual Property Rights Protection and Economic development: The case of digital piracy in the South Mediterranean countries [PDF]
: The potential benefits that could be gained from information technologies in South Mediterranean economies are constrained by both DRM and institutional protection related to Intellectual Property Rights.
Alaoui Belghiti, Moulay Abdelaziz +2 more
core +1 more source
Cytarabine is a key therapy for acute myeloid leukaemia (AML), but its efficacy is limited by the dNTPase SAMHD1, which hydrolyses its active metabolite. Screening nucleotide biosynthesis inhibitors revealed that IMPDH inhibitors selectively sensitise SAMHD1‐proficient AML cells to cytarabine.
Miriam Yagüe‐Capilla +9 more
wiley +1 more source
Keratin 19 (KRT19) is overexpressed in high‐grade serous ovarian cancer with high levels of Kallikrein‐related peptidases (KLK) 4–7 and is associated with poor survival. In vivo analyses demonstrate that elevated KRT19 increases peritoneal tumour burden.
Sophia Bielesch +13 more
wiley +1 more source

