Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "Behavioral Ecology and Sociobiology"
DOI: 10.1007/s00265-020-02890-5
Abstract: Females mate multiply despite numerous costs. It is well established that polyandry can result in sexual conflict, favoring male adaptations that prevent sperm competition often to the disadvantage of the female. Such adaptations are extreme…
read more here.
Keywords:
spider;
benefits polyandry;
sexual cannibalism;
cannibalism ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "Soft Computing"
DOI: 10.1007/s00500-020-04857-0
Abstract: Blockchain expansion is the high priority necessity to improve security. Hacking and other attacks are headway from system innovation and security measures for the cloud architecture. That is why the countermeasure deployed for such attacks…
read more here.
Keywords:
configuration files;
secure;
blockchain expansion;
secure assets ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Personal and Ubiquitous Computing"
DOI: 10.1007/s00779-021-01543-2
Abstract: In recent days, the Internet of Medical Things (IoMT) is commonly employed in different aspects of healthcare applications. Owing to the increasing necessitates of IoT, a huge amount of sensing data is collected from distinct…
read more here.
Keywords:
secure;
internet medical;
medical things;
model ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "Distributed and Parallel Databases"
DOI: 10.1007/s10619-021-07362-x
Abstract: Biometric strategy is primarily followed for authentication which incorporates the distinct recognition of the individual depending on their physical or behavioral features. Among all the biometrics techniques, ‘Iris scanning’ is touted to be the most…
read more here.
Keywords:
secure secret;
secret sharing;
scheme;
secure ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "GeoInformatica"
DOI: 10.1007/s10707-019-00389-4
Abstract: Mobile participatory sensing (MPS) could benefit many application domains. A major domain is smart transportation, with applications such as vehicular traffic monitoring, vehicle routing, or driving behavior analysis. However, MPS’s success depends on finding a…
read more here.
Keywords:
secure;
secure probes;
mobile participatory;
privacy ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "International Journal of Theoretical Physics"
DOI: 10.1007/s10773-019-04275-5
Abstract: Quantum key agreement (QKA) aims to negotiate a secure and consistent key among several participants. In this paper, we find that a type of QKA protocol is not secure when a participant is dishonest. He…
read more here.
Keywords:
key agreement;
quantum key;
designing secure;
secure ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "International Journal of Theoretical Physics"
DOI: 10.1007/s10773-021-04797-x
Abstract: A controlled deterministic secure semi-quantum communication protocol based on GHZ-like states is proposed for improving the security of semi-quantum communication. The protocol includes three participants, one is Alice with quantum capabilities who can prepare GHZ-like…
read more here.
Keywords:
secure;
quantum communication;
communication;
semi quantum ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "Journal of Medical Systems"
DOI: 10.1007/s10916-018-0982-x
Abstract: As Internet of Things (IoT) devices and other remote patient monitoring systems increase in popularity, security concerns about the transfer and logging of data transactions arise. In order to handle the protected health information (PHI)…
read more here.
Keywords:
remote patient;
patient monitoring;
secure;
smart contracts ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "Quantum Information Processing"
DOI: 10.1007/s11128-017-1766-9
Abstract: Secure multiparty computational geometry is an essential field of secure multiparty computation, which computes a computation geometric problem without revealing any private information of each party. Secure two-party distance computation is a primitive of secure…
read more here.
Keywords:
computation;
secure two;
secure;
party distance ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "Wireless Personal Communications"
DOI: 10.1007/s11277-017-3979-8
Abstract: In order to construct efficient public-key encryption scheme that is secure against adaptive chosen-ciphertext attacks (CCA), an efficient signature scheme and an identity-based encryption (IBE) scheme from the learning with errors over rings are presented…
read more here.
Keywords:
secure;
scheme;
chosen ciphertext;
encryption ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2017 at "Wireless Personal Communications"
DOI: 10.1007/s11277-017-4287-z
Abstract: Collaborative multi-user transmission and detection is a contemporary technique used for the up-link of code-division multiple access (CDMA). CDMA has contributed much to the field of wireless communication and still addresses many of the capacity…
read more here.
Keywords:
capacity;
cdma;
high capacity;
secure ... See more keywords