Results 61 to 70 of about 4,734 (200)

AMISEC: Leveraging Redundancy and Adaptability to Secure AmI Applications [PDF]

open access: yes, 2008
Security in Ambient Intelligence (AmI) poses too many challenges due to the inherently insecure nature of wireless sensor nodes. However, there are two characteristics of these environments that can be used effectively to prevent, detect, and confine ...
Araujo Pinto, Álvaro   +5 more
core   +1 more source

Selective Jamming of LoRaWAN using Commodity Hardware

open access: yes, 2017
Long range, low power networks are rapidly gaining acceptance in the Internet of Things (IoT) due to their ability to economically support long-range sensing and control applications while providing multi-year battery life.
Aras Emekcan   +7 more
core   +1 more source

Recent Applications of Mesoporous Silica Nanoparticles in Gene Therapy

open access: yesAdvanced Healthcare Materials, Volume 14, Issue 26, October 7, 2025.
The review summarizes the synthesis of mesoporous silica nanoparticles (MSNs) with modifiable surface properties, functionalization strategies, mechanism of therapeutic payload release, and current applications in gene therapy, focusing on their capabilities in the targeted delivery of therapeutic nucleic acids, CRISPR‐Cas systems, and other genetic ...
Tamanna Binte Huq   +4 more
wiley   +1 more source

A Counterattack-Detection Scheme in Transmission Time-Based Wormhole Detection Methods

open access: yesInternational Journal of Distributed Sensor Networks, 2013
In recent years, the Mobile Ad hoc Network (MANET) is getting more important and is being utilized in various fields. However, routing-disruption attacks have become a serious problem for MANET.
Dong-uk Kim   +3 more
doaj   +1 more source

A comparative study of reactive, proactive and hybrid routing protocol in wireless sensor network under wormhole attack

open access: yesJournal of Electrical Systems and Information Technology, 2018
Nowadays, ZigBee communication protocol is one of the dominating standards for wireless sensor & ad-hoc networks and Internet of Things (IoT) networks. Even though the ZigBee standard was formed with security in mind and lower consumption of power, still
Jegan Govindasamy   +1 more
doaj   +1 more source

Loc-Auth: Location-Enabled Authentication Through Attribute-Based Encryption

open access: yes, 2014
Traditional user authentication involves entering a username and password into a system. Strong authentication security demands, among other requirements, long, frequently hard-to-remember passwords.
Portnoi, Marcos, Shen, Chien-Chung
core   +1 more source

M‐SADR: Mobile Self Adaptive Data Rate for Enhanced LoRa End‐Device Connectivity on the Move

open access: yesInternational Journal of Communication Systems, Volume 38, Issue 15, October 2025.
The proposed M‐SADR method targets mobile LoRa end‐devices and achieves better performance, with a 2.4% improvement in packet delivery ratio and a 5.7% reduction in power consumption per successfully delivered packet. ABSTRACT Mobility is a critical aspect of the Internet of Things, reflecting the diverse and dynamic nature of potential applications ...
Vasileios Moysiadis   +6 more
wiley   +1 more source

Secure Multicast Routing Algorithm for Wireless Mesh Networks

open access: yesJournal of Computer Networks and Communications, 2016
Multicast is an indispensable communication technique in wireless mesh network (WMN). Many applications in WMN including multicast TV, audio and video conferencing, and multiplayer social gaming use multicast transmission.
Rakesh Matam, Somanath Tripathy
doaj   +1 more source

Interstellar Migration, the Population ‘Problem’ and the Climate Emergency

open access: yes
Critical Quarterly, Volume 68, Issue 1, Page 103-119, April 2026.
Anna Hartnell
wiley   +1 more source

StorjLedger: An Innovative Distributed Storage Ecosystem That Overcomes Blockchain Trade‐Offs Using Erasure‐Coded Sharding and Proof‐of‐Storage Consensus

open access: yesEngineering Reports, Volume 7, Issue 10, October 2025.
StorjLedger leverages erasure‐coded sharding and Proof‐of‐Storage to deliver nearly 1000 transactions per second with sub‐second latency, 98% data redundancy, and 76% lower storage costs, resolving the blockchain trilemma by harmonizing scalability, security, and decentralization.
Saha Reno, Koushik Roy
wiley   +1 more source

Home - About - Disclaimer - Privacy