Results 101 to 110 of about 2,411,901 (357)
Simple Spyware: Androids Invisible Foreground Services and How to (Ab)use Them [PDF]
With the releases of Android Oreo and Pie, Android introduced some background execution limitations for apps. Google restricted the execution of background services to save energy and to prevent apps from running endlessly in the background. Moreover, access to the device's sensors was changed and a new concept named foreground service has been ...
arxiv
This study investigates optoelectronic PUFs that improve on traditional optical and electrical PUFs. The absorber materials are randomly coated through spray coating, ligand exchange, and dynamic spin coating. Incident light generates wavelength‐dependent binary multikey and enhances security ternary keys, approaching near‐ideal inter‐ and intra ...
Hanseok Seo+6 more
wiley +1 more source
Theoretical and legal problems of state control over the judicial security service
The article discloses the essence and legal foundations of state control over the activities of the Judicial Security Service and covers the main theoretical and legal problems in this area. The author examines the approaches of domestic scientists to the essence of the concept of control and state control in the field of justice.
openaire +1 more source
Microbubble‐Controlled Delivery of Biofilm‐Targeting Nanoparticles to Treat MRSA Infection
Here, an effective strategy using microbubble (MB)‐controlled delivery of biofilm‐targeting nanoparticles (BTNs) for removal and therapy of methicillin‐resistant Staphylococcus aureus (MRSA) biofilm infections is introduced. In vivo delivery of MB with BTN is demonstrated to silence key bacterial genes involved in biofilm formation (icaA), bacterial ...
Ju Yeon Chung+6 more
wiley +1 more source
Data Migration among Different Clouds [PDF]
Cloud computing services are becoming more and more popular. However, the high concentration of data and services on the clouds make them attractive targets for various security attacks, including DoS, data theft, and privacy attacks. Additionally, cloud providers may fail to comply with service level agreement in terms of performance, availability ...
arxiv
Orchestration under Security Constraints [PDF]
International audienceAutomatic composition of web services is a challenging task. Many works have considered simplified automata models that abstract away from the structure of messages exchanged by the services.
Chevalier, Yannick+2 more
core +1 more source
Physical Layer Service Integration in 5G: Potentials and Challenges [PDF]
High transmission rate and secure communication have been identified as the key targets that need to be effectively addressed by fifth generation (5G) wireless systems. In this context, the concept of physical-layer security becomes attractive, as it can establish perfect security using only the characteristics of wireless medium.
arxiv
Islatravir‐loaded dissolving microarray patches (MAPs) provide a minimally invasive, long‐acting solution for HIV‐1 prevention and treatment. In rats, sustained islatravir delivery lasts up to three months, while in minipigs, efficacious plasma levels are detected for six days.
Qonita Kurnia Anjani+11 more
wiley +1 more source
Quire: Lightweight Provenance for Smart Phone Operating Systems [PDF]
Smartphone apps often run with full privileges to access the network and sensitive local resources, making it difficult for remote systems to have any trust in the provenance of network connections they receive. Even within the phone, different apps with
Dietz, Michael+4 more
core +3 more sources
Certification Authority Monitored Multilevel and Stateful Policy Based Authorization in Services Oriented Grids [PDF]
Services oriented grids will be more prominent among other kinds of grids in the present distributed environments. With the advent of online government services the governmental grids will come up in huge numbers. Apart from common security issues as in other grids, the authorization in service oriented grids faces certain shortcomings and needs to be ...
arxiv