Results 101 to 110 of about 2,411,901 (357)

Simple Spyware: Androids Invisible Foreground Services and How to (Ab)use Them [PDF]

open access: yesarXiv, 2020
With the releases of Android Oreo and Pie, Android introduced some background execution limitations for apps. Google restricted the execution of background services to save energy and to prevent apps from running endlessly in the background. Moreover, access to the device's sensors was changed and a new concept named foreground service has been ...
arxiv  

Quantum Dots and Perovskites‐Based Physically Unclonable Functions for Binary and Ternary Keys via Optical‐to‐Electrical Conversion

open access: yesAdvanced Functional Materials, EarlyView.
This study investigates optoelectronic PUFs that improve on traditional optical and electrical PUFs. The absorber materials are randomly coated through spray coating, ligand exchange, and dynamic spin coating. Incident light generates wavelength‐dependent binary multikey and enhances security ternary keys, approaching near‐ideal inter‐ and intra ...
Hanseok Seo   +6 more
wiley   +1 more source

Theoretical and legal problems of state control over the judicial security service

open access: yesLegal horizons, 2020
The article discloses the essence and legal foundations of state control over the activities of the Judicial Security Service and covers the main theoretical and legal problems in this area. The author examines the approaches of domestic scientists to the essence of the concept of control and state control in the field of justice.
openaire   +1 more source

Microbubble‐Controlled Delivery of Biofilm‐Targeting Nanoparticles to Treat MRSA Infection

open access: yesAdvanced Functional Materials, EarlyView.
Here, an effective strategy using microbubble (MB)‐controlled delivery of biofilm‐targeting nanoparticles (BTNs) for removal and therapy of methicillin‐resistant Staphylococcus aureus (MRSA) biofilm infections is introduced. In vivo delivery of MB with BTN is demonstrated to silence key bacterial genes involved in biofilm formation (icaA), bacterial ...
Ju Yeon Chung   +6 more
wiley   +1 more source

Data Migration among Different Clouds [PDF]

open access: yesarXiv, 2015
Cloud computing services are becoming more and more popular. However, the high concentration of data and services on the clouds make them attractive targets for various security attacks, including DoS, data theft, and privacy attacks. Additionally, cloud providers may fail to comply with service level agreement in terms of performance, availability ...
arxiv  

Orchestration under Security Constraints [PDF]

open access: yes, 2010
International audienceAutomatic composition of web services is a challenging task. Many works have considered simplified automata models that abstract away from the structure of messages exchanged by the services.
Chevalier, Yannick   +2 more
core   +1 more source

Physical Layer Service Integration in 5G: Potentials and Challenges [PDF]

open access: yesarXiv, 2017
High transmission rate and secure communication have been identified as the key targets that need to be effectively addressed by fifth generation (5G) wireless systems. In this context, the concept of physical-layer security becomes attractive, as it can establish perfect security using only the characteristics of wireless medium.
arxiv  

Delivery of Islatravir via High Drug‐Load, Long‐acting Microarray Patches for the Prevention or Treatment of Human Immunodeficiency Virus

open access: yesAdvanced Healthcare Materials, Volume 14, Issue 7, March 14, 2025.
Islatravir‐loaded dissolving microarray patches (MAPs) provide a minimally invasive, long‐acting solution for HIV‐1 prevention and treatment. In rats, sustained islatravir delivery lasts up to three months, while in minipigs, efficacious plasma levels are detected for six days.
Qonita Kurnia Anjani   +11 more
wiley   +1 more source

Quire: Lightweight Provenance for Smart Phone Operating Systems [PDF]

open access: yes, 2011
Smartphone apps often run with full privileges to access the network and sensitive local resources, making it difficult for remote systems to have any trust in the provenance of network connections they receive. Even within the phone, different apps with
Dietz, Michael   +4 more
core   +3 more sources

Certification Authority Monitored Multilevel and Stateful Policy Based Authorization in Services Oriented Grids [PDF]

open access: yesCertification Authority Monitored Multilevel and Stateful Policy Based Authorization in Services Oriented Grids, International Journal of Security, (IJS), Volume (3) : Issue(4):48-64, 2009, 2010
Services oriented grids will be more prominent among other kinds of grids in the present distributed environments. With the advent of online government services the governmental grids will come up in huge numbers. Apart from common security issues as in other grids, the authorization in service oriented grids faces certain shortcomings and needs to be ...
arxiv  

Home - About - Disclaimer - Privacy