Results 91 to 100 of about 247,400 (347)

A case study of the MEUSec method to enhance user experience and information security of digital identity wallets

open access: yesi-com
Digital identity wallets enable the storage and management of digital identities and verifiable credentials in one place on end users’ devices. This includes discount vouchers or customer cards, and security-critical data such as ID cards or driving ...
Sauer Max   +6 more
doaj   +1 more source

Usable Privacy and Security in Mobile Applications: Perception of Mobile End Users in Saudi Arabia

open access: yesBig Data and Cognitive Computing
Privacy and security is very critical for mobile users and in-depth research into the area highlights a need for more scientific literature on the perception and challenges of end users to better align the design of privacy and security controls with ...
Saqib Saeed
doaj   +1 more source

Cryptographic security of quantum key distribution [PDF]

open access: yes, 2014
This work is intended as an introduction to cryptographic security and a motivation for the widely used Quantum Key Distribution (QKD) security definition.
Portmann, Christopher, Renner, Renato
core  

Post‐COVID Fatigue Is Associated With Reduced Cortical Thickness After Hospitalization

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Neuropsychiatric symptoms are among the most prevalent sequelae of COVID‐19, particularly among hospitalized patients. Recent research has identified volumetric brain changes associated with COVID‐19. However, it currently remains poorly understood how brain changes relate to post‐COVID fatigue and cognitive deficits.
Tim J. Hartung   +190 more
wiley   +1 more source

Towards a Better Understanding of Mobile Banking App Adoption and Use: Integrating Security, Risk, and Trust into UTAUT2

open access: yesComputers
This paper expands the extended unified theory of acceptance and use of technology (UTAUT2) to include four additional constructs (security, risk, institutional trust, and technology trust), providing a more comprehensive understanding of mobile banking ...
Richard Apau   +2 more
doaj   +1 more source

Usable Security: Why Do We Need It? How Do We Get It? [PDF]

open access: yes, 2005
Security experts frequently refer to people as “the weakest link in the chain” of system security. Famed hacker Kevin Mitnick revealed that he hardly ever cracked a password, because it “was easier to dupe people into revealing it” by employing a range
Flechais, I, Sasse, MA
core  

Age‐Related Characteristics of SYT1‐Associated Neurodevelopmental Disorder

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objectives We describe the clinical manifestations and developmental abilities of individuals with SYT1‐associated neurodevelopmental disorder (Baker‐Gordon syndrome) from infancy to adulthood. We further describe the neuroradiological and electrophysiological characteristics of the condition at different ages, and explore the associations ...
Sam G. Norwitz   +3 more
wiley   +1 more source

Baltic Gender Data Management Plan : Version 1 [PDF]

open access: yes, 2017
Provides a summary of the Data Management Plan (DMP) addressing FAIR (findable, accessible, interoperable, re-usable) data, allocation of resources, data security and ethical ...
Matthes, Katja, Mehrtens, Hela
core  

Cognitive Status in People With Epilepsy in the Republic of Guinea: A Prospective, Case–Control Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective People with epilepsy (PWE) may experience cognitive deficits but fail to undergo formal evaluation. This study compares cognitive status between PWE and healthy controls in the West African Republic of Guinea. Methods A cross‐sectional, case–control study was conducted in sequential recruitment phases (July 2024–July 2025) at Ignace ...
Maya L. Mastick   +14 more
wiley   +1 more source

Home - About - Disclaimer - Privacy