Results 91 to 100 of about 247,400 (347)
Digital identity wallets enable the storage and management of digital identities and verifiable credentials in one place on end users’ devices. This includes discount vouchers or customer cards, and security-critical data such as ID cards or driving ...
Sauer Max +6 more
doaj +1 more source
Usable Privacy and Security in Mobile Applications: Perception of Mobile End Users in Saudi Arabia
Privacy and security is very critical for mobile users and in-depth research into the area highlights a need for more scientific literature on the perception and challenges of end users to better align the design of privacy and security controls with ...
Saqib Saeed
doaj +1 more source
Cryptographic security of quantum key distribution [PDF]
This work is intended as an introduction to cryptographic security and a motivation for the widely used Quantum Key Distribution (QKD) security definition.
Portmann, Christopher, Renner, Renato
core
Post‐COVID Fatigue Is Associated With Reduced Cortical Thickness After Hospitalization
ABSTRACT Objective Neuropsychiatric symptoms are among the most prevalent sequelae of COVID‐19, particularly among hospitalized patients. Recent research has identified volumetric brain changes associated with COVID‐19. However, it currently remains poorly understood how brain changes relate to post‐COVID fatigue and cognitive deficits.
Tim J. Hartung +190 more
wiley +1 more source
This paper expands the extended unified theory of acceptance and use of technology (UTAUT2) to include four additional constructs (security, risk, institutional trust, and technology trust), providing a more comprehensive understanding of mobile banking ...
Richard Apau +2 more
doaj +1 more source
The Role of Visual Features in Text-Based CAPTCHAs: An fNIRS Study for Usable Security. [PDF]
Mülazimoğlu E +2 more
europepmc +1 more source
Usable Security: Why Do We Need It? How Do We Get It? [PDF]
Security experts frequently refer to people as “the weakest link in the chain” of system security. Famed hacker Kevin Mitnick revealed that he hardly ever cracked a password, because it “was easier to dupe people into revealing it” by employing a range
Flechais, I, Sasse, MA
core
Age‐Related Characteristics of SYT1‐Associated Neurodevelopmental Disorder
ABSTRACT Objectives We describe the clinical manifestations and developmental abilities of individuals with SYT1‐associated neurodevelopmental disorder (Baker‐Gordon syndrome) from infancy to adulthood. We further describe the neuroradiological and electrophysiological characteristics of the condition at different ages, and explore the associations ...
Sam G. Norwitz +3 more
wiley +1 more source
Baltic Gender Data Management Plan : Version 1 [PDF]
Provides a summary of the Data Management Plan (DMP) addressing FAIR (findable, accessible, interoperable, re-usable) data, allocation of resources, data security and ethical ...
Matthes, Katja, Mehrtens, Hela
core
ABSTRACT Objective People with epilepsy (PWE) may experience cognitive deficits but fail to undergo formal evaluation. This study compares cognitive status between PWE and healthy controls in the West African Republic of Guinea. Methods A cross‐sectional, case–control study was conducted in sequential recruitment phases (July 2024–July 2025) at Ignace ...
Maya L. Mastick +14 more
wiley +1 more source

