To see the other types of publications on this topic, follow the link: Challenge-response protocol.

Journal articles on the topic 'Challenge-response protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Challenge-response protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Rhee, Keun-Woo, Dong-Kyu Oh, Jin Kwak, Soo-Hyun Oh, Seung-Joo Kim, and Dong-Ho Won. "Challenge-Response Based Secure RFID Authentication Protocol for Distributed Database Environment." KIPS Transactions:PartC 12C, no. 3 (2005): 309–16. http://dx.doi.org/10.3745/kipstc.2005.12c.3.309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wei, Da Wei, Wei Liu, and Xiu Feng Zhao. "The Deniability Analysis for a Deniable Authentication Protocol." Applied Mechanics and Materials 195-196 (August 2012): 992–97. http://dx.doi.org/10.4028/www.scientific.net/amm.195-196.992.

Full text
Abstract:
The notion of deniable authentication is introduced by Dwork et al., deniable authentication protocols allow a sender to authenticate a message for receiver, in a way that the receiver cannot convince a third party that such authentication ever took place. Raimondo et al. present authentication protocol λProj and deniable version Den-λProj by adding challenge-response mechanism. In this paper we prove the protocol λProj without challenge-response is deniable against malicious verifier under subset witness assumption.
APA, Harvard, Vancouver, ISO, and other styles
3

Paul, Surjit, Sanjay Kumar, and Rajiv Ranjan Suman. "A Quantum Secure Entity Authentication Protocol Design for Network Security." International Journal of Information Security and Privacy 13, no. 4 (2019): 1–11. http://dx.doi.org/10.4018/ijisp.2019100101.

Full text
Abstract:
Authentication is one of the significant issues for all kinds of network communications. Most of the authentication protocols designed and implemented so far for entity authentication are based on classical cryptographic techniques to prevent themselves from different types of attacks. These protocols use either password or challenge for authentication. In this article, the design of the proposed quantum secure entity authentication protocol is shown. The proposed protocol is based on the challenge response method. Due to quantum computer capability to break mathematical complexity-based crypt
APA, Harvard, Vancouver, ISO, and other styles
4

Al-Maliki, Ossama, and Hisham Al-Assam. "Challenge-response mutual authentication protocol for EMV contactless cards." Computers & Security 103 (April 2021): 102186. http://dx.doi.org/10.1016/j.cose.2021.102186.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rastogi, Nitesh, Avinav Pathak, and Shweta Rastogi. "Enhanced Authentication Scheme using Password Integrated Challenge Response Protocol." International Journal of Computer Applications 62, no. 9 (2013): 15–19. http://dx.doi.org/10.5120/10107-4764.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jeon, Il-Soo, and Eun-Jun Yoon. "RFID Distance Bounding Protocol Using Multiple Bits Challenge and Response." Journal of the Korea Industrial Information Systems Research 17, no. 3 (2012): 19–26. http://dx.doi.org/10.9723/jksiis.2012.17.3.019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Azdad, Nabila, and Mohamed Elboukhari. "FOTA-MAC: A Novel Traffic Adaptive MAC Protocol for Wireless Body Area Networks." International Journal of Interactive Mobile Technologies (iJIM) 18, no. 02 (2024): 43–51. http://dx.doi.org/10.3991/ijim.v18i02.42985.

Full text
Abstract:
Recently, Wireless Body Area Networks (WBANs) have emerged as a significant breakthrough in the healthcare sector due to their immense potential to revolutionize health outcomes. This type of network is able to support a diverse range of applications with traffic rates ranging from several bits per hour up to 10 megabits per second. The challenge lies in accommodating this wide range of applications and meeting their distinct requirements using a single suitably flexible medium access control protocol. In response to this challenge, our paper proposes a novel Traffic Adaptive MAC protocol desi
APA, Harvard, Vancouver, ISO, and other styles
8

Cambou, Bertrand Francis, and Mahafujul Alam. "Challenge–Response Pair Mechanisms and Multi-Factor Authentication Schemes to Protect Private Keys." Applied Sciences 15, no. 6 (2025): 3089. https://doi.org/10.3390/app15063089.

Full text
Abstract:
Crypto wallets store and protect the private keys needed to sign transactions for crypto currencies; they are secured by multi-factor authentication schemes. However, the loss of a wallet, or a dysfunctional factor of authentication, can be catastrophic, as the keys are then lost as well as the crypto currencies. Such difficult tradeoffs between the protection of the private keys and factors of authentication that are easy to use are also present in public key infrastructures, banking cards, smartphones and smartcards. In this paper, we present protocols based on novel challenge–response pair
APA, Harvard, Vancouver, ISO, and other styles
9

Sha Feng, Dongming Yu, Juanjuan Gong, Tao Men,. "An Analysis and Improvement Scheme for the Weakness of Kerberos V5 Authentication." Journal of Electrical Systems 20, no. 2 (2024): 1955–60. http://dx.doi.org/10.52783/jes.1642.

Full text
Abstract:
The security protocol of network system can ensure the reliability of network communication. Kerberos protocol is a kind of security verification mechanism based on shared key, which has been adopted for a long time on the Internet. This text introduces the authentication process of Kerberos v5 protocol. To the defect that the authentication server don’t authenticate the user’s identity but it hold safe in building on the basis whether the user can correctly decrypt the ciphertext message in the protocol, we put forward a scheme that adding in the Challenge/Response mechanism to improve its se
APA, Harvard, Vancouver, ISO, and other styles
10

Gabr, Mahmoud M., Mahmoud M. Zakaria, Ayman F. Refaie, et al. "Generation of Insulin-Producing Cells from Human Bone Marrow-Derived Mesenchymal Stem Cells: Comparison of Three Differentiation Protocols." BioMed Research International 2014 (2014): 1–9. http://dx.doi.org/10.1155/2014/832736.

Full text
Abstract:
Introduction. Many protocols were utilized for directed differentiation of mesenchymal stem cells (MSCs) to form insulin-producing cells (IPCs). We compared the relative efficiency of three differentiation protocols.Methods. Human bone marrow-derived MSCs (HBM-MSCs) were obtained from three insulin-dependent type 2 diabetic patients. Differentiation into IPCs was carried out by three protocols: conophylline-based (one-step protocol), trichostatin-A-based (two-step protocol), andβ-mercaptoethanol-based (three-step protocol). At the end of differentiation, cells were evaluated by immunolabeling
APA, Harvard, Vancouver, ISO, and other styles
11

Bood, Johan R., Britt-Marie Sundblad, Ingrid Delin, et al. "Urinary excretion of lipid mediators in response to repeated eucapnic voluntary hyperpnea in asthmatic subjects." Journal of Applied Physiology 119, no. 3 (2015): 272–79. http://dx.doi.org/10.1152/japplphysiol.00301.2015.

Full text
Abstract:
Exercise-induced bronchoconstriction displays refractoriness manifested as a decreased response to repeated exercise challenge within hours. The refractoriness may be attenuated by inhibition of the biosynthesis of prostaglandins (PG). The aim of the study was to determine which PGs and other lipid mediators are excreted during the refractory period. First, 16 subjects with mild stable asthma performed two repeated 4-min challenges with eucapnic voluntary hyperpnea (EVH) 1 and 3 h apart. There was a similar degree of refractoriness in both protocols (∼15% protection). The 1-h interval was too
APA, Harvard, Vancouver, ISO, and other styles
12

An, Zheng. "Research on Comparison of Security Protocols for RFID Systems." Applied and Computational Engineering 99, no. 1 (2024): 7–13. http://dx.doi.org/10.54254/2755-2721/99/20251748.

Full text
Abstract:
Abstract: As the adoption of Radio Frequency Identification (RFID) technology continues to expand, concerns about its security have grown in significance. And the study of RFID security protocols aims to enhance system security and to provide solutions that can be applied to a variety of scenarios. Therefore, this paper delves into the security protocols employed in RFID technology, investigating their applications across a range of domains such as logistics tracking, financial payments, and access control systems. Besides, through a combination of literature review and comparative analysis, t
APA, Harvard, Vancouver, ISO, and other styles
13

Xiao, Yuelei, and Yang Wu. "5G-IPAKA: An Improved Primary Authentication and Key Agreement Protocol for 5G Networks." Information 13, no. 3 (2022): 125. http://dx.doi.org/10.3390/info13030125.

Full text
Abstract:
The 3rd generation partnership project (3GPP) has been enhancing the security of the 5G AKA (authentication and key agreement) protocol. However, there may still be some shortcomings in the latest version of the 5G AKA protocol. According to the analysis of the latest version of the 5G AKA protocol, this paper points out seven of its shortcomings. To overcome these shortcomings, an improved primary authentication and key agreement protocol for 5G networks is proposed, which is named 5G-IPAKA. Compared with the latest version of the 5G AKA protocol, the main improvements include that the pre-sh
APA, Harvard, Vancouver, ISO, and other styles
14

Kamegasawa, Amélia, Maria Tereza Rezkallah Iwasso, Rosa Viero, and Marcello Franco. "Evaluation of different immunization protocols with P. brasiliensis antigens in Guinea pigs." Revista do Instituto de Medicina Tropical de São Paulo 34, no. 3 (1992): 243–49. http://dx.doi.org/10.1590/s0036-46651992000300011.

Full text
Abstract:
The objective of the present study was to develop an efficient and reproducible protocol of immunization of guinea pigs with P. brasiliensis antigens as an animal model for future studies of protective immunity mechanisms. We tested three different antigens (particulate, soluble and combined) and six protocols in the presence and absence of Freund's complete adjuvant and with different numbers of immunizing doses and variable lenght of time between the last immunizing dose and challenge. The efficacy of the immunizing protocol was evaluated by measuring the humoral and cellular anti-P. brasili
APA, Harvard, Vancouver, ISO, and other styles
15

Alharthi, Abdullah M., and Fahad S. Altuwaijri. "Lightweight IoT Authentication Protocol Using PUFs in Smart Manufacturing Industry." Electronics 14, no. 9 (2025): 1788. https://doi.org/10.3390/electronics14091788.

Full text
Abstract:
Over recent years, the Internet of Things (IoT) has been widely adopted in various domains, including modern manufacturing. However, IoT security remains a critical challenge due to resource constraints and deployment in unsecured environments. This paper introduces a lightweight IoT authentication protocol leveraging physical unclonable functions (PUFs) tailored for smart manufacturing. The protocol employs lightweight cryptographic techniques and a PUF-based challenge–response mechanism to ensure key security properties such as confidentiality, integrity, anonymity, and perfect forward secre
APA, Harvard, Vancouver, ISO, and other styles
16

Yi, Fumin, Lei Zhang, Lijuan Xu, Shumian Yang, Yanrong Lu, and Dawei Zhao. "WSNEAP: An Efficient Authentication Protocol for IIoT-Oriented Wireless Sensor Networks." Sensors 22, no. 19 (2022): 7413. http://dx.doi.org/10.3390/s22197413.

Full text
Abstract:
With the development of the Industrial Internet of Things (IIoT), industrial wireless sensors need to upload the collected private data to the cloud servers, resulting in a large amount of private data being exposed on the Internet. Private data are vulnerable to hacking. Many complex wireless-sensor-authentication protocols have been proposed. In this paper, we proposed an efficient authentication protocol for IIoT-oriented wireless sensor networks. The protocol introduces the PUF chip, and uses the Bloom filter to save and query the challenge–response pairs generated by the PUF chip. It ensu
APA, Harvard, Vancouver, ISO, and other styles
17

Aljbur, Nazik K., Mohammed Yousif, Mahmood A. Al-Shareeda, Mohammed Amin Almaiah, and Mansour Obeida. "Minimizing overhead using efficient PUF-based authentication in flying ad hoc networks." International Journal of Innovative Research and Scientific Studies 8, no. 2 (2025): 4123–36. https://doi.org/10.53894/ijirss.v8i2.6246.

Full text
Abstract:
High-mobility and low-computation resource UAVs are the basic units of what are called Flying Ad Hoc Networks (FANETs), which are prone to abuse and subject to wireless threats. Therefore, secure and efficient communication protocols are needed to guarantee the safety of information exchange. Traditional cryptographic solutions are not suitable due to the high resource demands expected from UAV platforms. In order to mitigate this challenge, this paper presents an improved lightweight authentication scheme based on Physically Unclonable Functions (PUFs) with the goal of reducing the communicat
APA, Harvard, Vancouver, ISO, and other styles
18

Havrljenko, Jelena, Vesna Kopitovic, Aleksandra Trninic Pjevic, et al. "The Effectiveness of the GnRH Agonist/Antagonist Protocols for Different Poseidon Subgroups of Poor Ovarian Responders." Journal of Clinical Medicine 14, no. 6 (2025): 2026. https://doi.org/10.3390/jcm14062026.

Full text
Abstract:
Background/Objectives: Poor responder patients represent the greatest challenge in ART. An inadequate response to COS strongly correlates with a reduced chance of conception. A novel classification of poor responders overcame a deficiency in the Bologna criteria and distinguished an expected and unexpected low ovarian response, allowing for an individual treatment approach to be created. In this study, we compared the clinical outcomes in poor responders, according to two different ovarian stimulation protocols, GnRH agonists and antagonists, classified according to the Poseidon criteria, to d
APA, Harvard, Vancouver, ISO, and other styles
19

Borenstein, L. A., J. D. Radolf, T. E. Fehniger, D. R. Blanco, J. N. Miller, and M. A. Lovett. "Immunization of rabbits with recombinant Treponema pallidum surface antigen 4D alters the course of experimental syphilis." Journal of Immunology 140, no. 7 (1988): 2415–21. http://dx.doi.org/10.4049/jimmunol.140.7.2415.

Full text
Abstract:
Abstract Rabbits immunized with the protease resistant recombinant Treponema pallidum surface-associated Ag 4D showed an altered course of experimental syphilis after intradermal challenge with virulent T. pallidum. Vaccination trials using three different protocols were examined. In one experiment, a combined i.m.-i.v. immunization protocol was compared with an i.m. injection schedule. Four of five rabbits immunized by the i.m.-i.v. protocol developed morphologically atypical lesions at each of 16 sites, whereas the i.m. injected animals showed no evidence of attenuated disease. Moreover, imm
APA, Harvard, Vancouver, ISO, and other styles
20

Prieto-Sánchez, Andrés, Juan M. García-Ceberino, Juan Luis Leon-Llamas, and Santos Villafaina. "An Incongruent 2-Minute Stroop Task Alters the Response Time Performance in Semi-Elite Soccer Players: A Pilot Study." Applied Sciences 14, no. 22 (2024): 10296. http://dx.doi.org/10.3390/app142210296.

Full text
Abstract:
Introduction: Mental fatigue is a key factor in soccer that can affect physical performance. Mental fatigue protocols based on the Stroop test used in soccer involve extensive time, ranging from 10 to 30 min. Offering a protocol with a shorter duration that is more applicable in ecological situations seems to be an exciting challenge. Objective: To analyze the effects of a mental fatigue induction protocol (2 min Stroop test in its incongruent mode) on decision-making, response time, and technical execution accuracy in soccer players. Methods: A total of 18 semi-elite soccer male players, 25.8
APA, Harvard, Vancouver, ISO, and other styles
21

Alobaidy, Yousif Safaa, and Osama Ali Awad. "Real-time optimized wireless networked control system with cooperative network protocols." Indonesian Journal of Electrical Engineering and Computer Science 31, no. 3 (2023): 1350. http://dx.doi.org/10.11591/ijeecs.v31.i3.pp1350-1361.

Full text
Abstract:
In this paper, we present a real-time optimized fuzzy fuzzy proportional integral derivative (FPID)-controlled wireless networked system for a high-torque direct current (DC) motor. The main challenge faced by such systems is the delay in the wireless networked control system (WNCS). We employed a powerful FPID controller tuned using particle swarm optimization (PSO) technique to compensate for the delay. The system is tested on a network using the TrueTime simulator with different parameters. The results show that the system exhibits a very stable response, with the FPID controller compensati
APA, Harvard, Vancouver, ISO, and other styles
22

Yousif, Safaa Alobaidy, and Ali Awad Osama. "Real-time optimized wireless networked control system with cooperative network protocols." Real-time optimized wireless networked control system with cooperative network protocols 31, no. 3 (2023): 1350–61. https://doi.org/10.11591/ijeecs.v31.i3.pp1350-1361.

Full text
Abstract:
In this paper, we present a real-time optimized fuzzy fuzzy proportional integral derivative (FPID)-controlled wireless networked system for a hightorque direct current (DC) motor. The main challenge faced by such systems is the delay in the wireless networked control system (WNCS). We employed a powerful FPID controller tuned using particle swarm optimization (PSO) technique to compensate for the delay. The system is tested on a network using the TrueTime simulator with different parameters. The results show that the system exhibits a very stable response, with the FPID controller compensatin
APA, Harvard, Vancouver, ISO, and other styles
23

Hou, Gaopan, Jianfeng Ma, Jiayi Li, and Chen Liang. "Audit Outsourced Data in Internet of Things." Security and Communication Networks 2021 (May 8, 2021): 1–11. http://dx.doi.org/10.1155/2021/6662135.

Full text
Abstract:
With the increase in network transmission rates, the Internet of Things (IoT) has gradually become a trend. Users can upload the data generated by the device to the cloud database to save local storage space, thereby reducing local storage costs. Because uploading data to the cloud loses physical control of the data, an audit is required. Traditional audit protocols are not completely suitable for lightweight devices in the IoT. This paper proposes a new type of audit protocol suitable for lightweight devices with weak computing power. This protocol transfers part of the computation of data ta
APA, Harvard, Vancouver, ISO, and other styles
24

Hudgins, Lisa C., Thomas S. Parker, Daniel M. Levine, and Marc K. Hellerstein. "A Dual Sugar Challenge Test for Lipogenic Sensitivity to Dietary Fructose." Journal of Clinical Endocrinology & Metabolism 96, no. 3 (2011): 861–68. http://dx.doi.org/10.1210/jc.2010-2007.

Full text
Abstract:
Context: Increased hepatic de novo lipogenesis (DNL) in response to dietary sugar is implicated in dyslipidemia, fatty liver, and insulin resistance. Objective: The aim of the study was to develop a simple outpatient tolerance test for lipogenic sensitivity to dietary sugar. Design and Setting: In inpatients given repeated doses of fructose, protocol 1 compared the acute increase in DNL determined from the percentage of palmitate (“new palmitate”) and the percentage of isotopically labeled palmitate (“%DNL”) in very low-density lipoprotein triglyceride (TG). Protocol 2 compared the increase in
APA, Harvard, Vancouver, ISO, and other styles
25

Hayashi, Victor, and Wilson Ruggiero. "Non-Invasive Challenge Response Authentication for Voice Transactions with Smart Home Behavior." Sensors 20, no. 22 (2020): 6563. http://dx.doi.org/10.3390/s20226563.

Full text
Abstract:
Smart speakers, such as Alexa and Google Home, support daily activities in smart home environments. Even though voice commands enable friction-less interactions, existing financial transaction authorization mechanisms hinder usability. A non-invasive authorization by leveraging presence and light sensors’ data is proposed in order to replace invasive procedure through smartphone notification. The Coloured Petri Net model was created for synthetic data generation, and one month data were collected in test bed with real users. Random Forest machine learning models were used for smart home behavi
APA, Harvard, Vancouver, ISO, and other styles
26

Ramírez DDS, MSc, PhD, Karol, Daniel Quesada-Yamasaki MLS, and Jaime Fornaguera-Trías PhD. "A Protocol to Perform Systemic Lipopolysacharide (LPS) Challenge in Rats." Odovtos - International Journal of Dental Sciences 21, no. 1 (2019): 53–66. http://dx.doi.org/10.15517/ijds.v21i1.35510.

Full text
Abstract:
Lipopolysaccharide (LPS) is a component of the outer membrane of Gram-negative bacteria. In animals, intraperitoneal administration of LPS, stimulates innate immunity and the production of pro-inflammatory cytokines. LPS provides an inflammatory stimulus that activates the neuroimmune and neuroendocrine systems resulting in a set of responses termed sickness behavior. The purpose of this protocol is to describe step-by-step the preparation and procedure of application of intraperitoneal injection of LPS in rats, as a guide for those researchers that want to use this assay to mount an inflammat
APA, Harvard, Vancouver, ISO, and other styles
27

Paz, Maria Constanza, Natalia Andrea Marchese, Liliana M. Cancela, and Claudia Bregonzio. "Angiotensin II AT1Receptors Are Involved in Neuronal Activation Induced by Amphetamine in a Two-Injection Protocol." BioMed Research International 2013 (2013): 1–10. http://dx.doi.org/10.1155/2013/534817.

Full text
Abstract:
It was already found that Ang II AT1receptors are involved in the neuroadaptative changes induced by a single exposure to amphetamine, and such changes are related to the development of behavioral and neurochemical sensitization. The induction of the immediately early gene c-fos has been used to define brain activated areas by amphetamine. Our aim was to evaluate the participation of AT1receptors in the neuronal activation induced by amphetamine sensitization. The study examined the c-fos expression in mesocorticolimbic areas induced by amphetamine challenge (0.5 mg/kg i.p) in animals pretreat
APA, Harvard, Vancouver, ISO, and other styles
28

Chen, Yu-Yi, Meng-Lin Tsai, and Jinn-Ke Jan. "The design of RFID access control protocol using the strategy of indefinite-index and challenge-response." Computer Communications 34, no. 3 (2011): 250–56. http://dx.doi.org/10.1016/j.comcom.2010.05.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Hayashi, Victor Takashi, and Wilson Vicente Ruggiero. "Hands-Free Authentication for Virtual Assistants with Trusted IoT Device and Machine Learning." Sensors 22, no. 4 (2022): 1325. http://dx.doi.org/10.3390/s22041325.

Full text
Abstract:
Virtual assistants, deployed on smartphone and smart speaker devices, enable hands-free financial transactions by voice commands. Even though these voice transactions are frictionless for end users, they are susceptible to typical attacks to authentication protocols (e.g., replay). Using traditional knowledge-based or possession-based authentication with additional invasive interactions raises users concerns regarding security and usefulness. State-of-the-art schemes for trusted devices with physical unclonable functions (PUF) have complex enrollment processes. We propose a scheme based on a c
APA, Harvard, Vancouver, ISO, and other styles
30

Haby, MM, JK Peat, CM Mellis, SD Anderson, and AJ Woolcock. "An exercise challenge for epidemiological studies of childhood asthma: validity and repeatability." European Respiratory Journal 8, no. 5 (1995): 729–36. http://dx.doi.org/10.1183/09031936.95.08050729.

Full text
Abstract:
We assessed the validity, repeatability and practicality of a standardized exercise challenge protocol for measuring airway responsiveness in epidemiological studies of asthma in children aged 8-11 yrs. The construct validity of the exercise challenge was assessed by comparing response to exercise with other measures of asthma, i.e. wheeze frequency, diagnosed asthma, asthma medication use, atopy and urgent doctor visits (n = 802), and by comparison with response to histamine challenge (n = 201). Repeatability was assessed by comparison of responsiveness to two exercise challenges within 3 day
APA, Harvard, Vancouver, ISO, and other styles
31

Vitalone-Raccaro, Nancy A. "Revitalizing Strategy Instruction." Intervention in School and Clinic 53, no. 1 (2017): 28–35. http://dx.doi.org/10.1177/1053451217692568.

Full text
Abstract:
The national focus on teacher accountability and the resulting emphasis on raising the bar for teacher evaluations challenge teachers of students with learning disabilities (LD) to rethink instructional design and delivery. In response to these challenges, this article introduces a two-part protocol for planning and teaching strategy instruction to elementary education students with LD being educated in classrooms alongside their grade-level peers. The rationale, research background, detailed implementation information, and concrete examples of how the protocol was integrated into lesson plann
APA, Harvard, Vancouver, ISO, and other styles
32

Alam, Mahafujul, Jeffrey Hoffstein, and Bertrand Cambou. "Privately Generated Key Pairs for Post Quantum Cryptography in a Distributed Network." Applied Sciences 14, no. 19 (2024): 8863. http://dx.doi.org/10.3390/app14198863.

Full text
Abstract:
In the proposed protocol, a trusted entity interacts with the terminal device of each user to verify the legitimacy of the public keys without having access to the private keys that are generated and kept totally secret by the user. The protocol introduces challenge–response–pair mechanisms enabling the generation, distribution, and verification of cryptographic public–private key pairs in a distributed network with multi-factor authentication, tokens, and template-less biometry. While protocols using generic digital signature algorithms are proposed, the focus of the experimental work was to
APA, Harvard, Vancouver, ISO, and other styles
33

Chaudhary, Ravi Raushan Kumar, Ashish Singh, and Kakali Chatterjee. "An Enhanced Authentication Scheme for Internet of Things Based E-Healthcare System." Journal of Computational and Theoretical Nanoscience 17, no. 1 (2020): 246–53. http://dx.doi.org/10.1166/jctn.2020.8658.

Full text
Abstract:
Security is a major challenge in modern IoT based healthcare monitoring systems. It provides many benefits such as critical patient monitoring, remote diagnosis at anytime, anywhere. Hence, security of this data is essential when the healthcare professionals access it. Also, while storing the patients record; it must be kept safe from misuse and modification of data as other devices can easily track it. To prevent this type of threats, we have proposed a mutual authentication protocol to enhance health care security and to resist vulnerable attacks. The proposed scheme used Challenge response
APA, Harvard, Vancouver, ISO, and other styles
34

Ingram, Emma, Lauren Hawkins, David M. Morris, et al. "R1 changes in the human placenta at 3 T in response to a maternal oxygen challenge protocol." Placenta 39 (March 2016): 151–53. http://dx.doi.org/10.1016/j.placenta.2016.01.016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Van Der Velden, Daphne Liselotte, Lisanne C. Hamming, Henk M. W. Verheul, et al. "The Drug Rediscovery Protocol (DRUP)." Journal of Clinical Oncology 35, no. 15_suppl (2017): 2547. http://dx.doi.org/10.1200/jco.2017.35.15_suppl.2547.

Full text
Abstract:
2547 Background: Bringing precision medicine to cancer patients remains a challenge. For many cancers, the relative contribution of tumor type, mutations or CNV to drug sensitivity remains unknown. In addition, drug access is generally limited to the labeled indication, bypassing rarer disease subgroups for which large trials are not feasible. An innovative trial that facilitates drug access, whilst systematically analyzing treatment outcomes and biomarkers, could help overcome these challenges. Methods: We designed a prospective, non randomized clinical trial in which patients with advanced c
APA, Harvard, Vancouver, ISO, and other styles
36

Hlavacs, Helmut, Wilfried Gansterer, Hannes Schabauer, et al. "Enhancing ZRTP by using Computational Puzzles." JUCS - Journal of Universal Computer Science 14, no. (5) (2008): 693–716. https://doi.org/10.3217/jucs-014-05-0693.

Full text
Abstract:
In this paper we present and discuss a new approach for securing multimedia communication, which is based on three innovations. The first innovation is the integration of a challenge-response scheme for enhancing the Diffie-Hellman based ZRTP protocol. When being called, a callee must present the result of a computational puzzle (a "token") within a short amount of time. A Man-in-the-Middle (MitM) would not be able to compute such a token within the required time, and thus fail to get into the media path. The scheme works best in situations when ZRTP is most vulnerable to so-called Mafia Attac
APA, Harvard, Vancouver, ISO, and other styles
37

Hansson, Andreas, Kees Goossens, and Andrei Rădulescu. "Avoiding Message-Dependent Deadlock in Network-Based Systems on Chip." VLSI Design 2007 (April 30, 2007): 1–10. http://dx.doi.org/10.1155/2007/95859.

Full text
Abstract:
Networks on chip (NoCs) are an essential component of systems on chip (SoCs) and much research is devoted to deadlock avoidance in NoCs. Prior work focuses on the router network while protocol interactions between NoC and intellectual property (IP) modules are not considered. These interactions introduce message dependencies that affect deadlock properties of the SoC as a whole. Even when NoC and IP dependency graphs are cycle-free in isolation, put together they may still create cycles. Traditionally, SoCs rely solely on request-response protocols. However, emerging SoCs adopt higher-level pr
APA, Harvard, Vancouver, ISO, and other styles
38

Usman, Muhammad, Rashid Amin, Hamza Aldabbas, and Bader Alouffi. "Lightweight Challenge-Response Authentication in SDN-Based UAVs Using Elliptic Curve Cryptography." Electronics 11, no. 7 (2022): 1026. http://dx.doi.org/10.3390/electronics11071026.

Full text
Abstract:
Unmanned aerial vehicles (UAVs) (also known as drones) are aircraft that do not require the presence of a human pilot to fly. UAVs can be controlled remotely by a human operator or autonomously by onboard computer systems. UAVs have many military uses, including battlefield surveillance, effective target tracking and engagement in air-to-ground warfare, and situational awareness in challenging circumstances. They also offer a distinct advantage in various applications such as forest fire monitoring and surveillance. Surveillance systems are developed using advanced technologies in the modern e
APA, Harvard, Vancouver, ISO, and other styles
39

Neef, Sylvia K., Nicole Janssen, Stefan Winter, et al. "Metabolic Drug Response Phenotyping in Colorectal Cancer Organoids by LC-QTOF-MS." Metabolites 10, no. 12 (2020): 494. http://dx.doi.org/10.3390/metabo10120494.

Full text
Abstract:
As metabolic rewiring is crucial for cancer cell proliferation, metabolic phenotyping of patient-derived organoids is desirable to identify drug-induced changes and trace metabolic vulnerabilities of tumor subtypes. We established a novel protocol for metabolomic and lipidomic profiling of colorectal cancer organoids by liquid chromatography quadrupole time-of-flight mass spectrometry (LC-QTOF-MS) facing the challenge of capturing metabolic information from a minimal sample amount (<500 cells/injection) in the presence of an extracellular matrix (ECM). The best procedure of the tested proto
APA, Harvard, Vancouver, ISO, and other styles
40

Birchall, Martin A., Finbarr O'Connell, Jane Henderson, et al. "Topical Salmeterol Reduces Protein Content of Nasal Lavage Fluid in Response to Allergen and Histamine Challenge: Double-Blind Cross-over Placebo-Controlled Studies in Adults." American Journal of Rhinology 10, no. 4 (1996): 251–56. http://dx.doi.org/10.2500/105065896782103108.

Full text
Abstract:
We have studied the effects of topical intranasal β-2-adrenoceptor agonists on nasal airflow resistance (Rnaw) and secretions. Pretreatment with salmeterol (SM) and salbutamol (SB) was given in two double-blind, placebo-controlled studies. In Protocol 1, 15 patients with allergic rhinitis were challenged with a threshold dose of allergen. Rnaw and lavage fluid total protein, albumin, mucin, lysozyme, tryptase, histamine, and eosinophil cationic protein (ECP) were measured. In Protocol 2, 20 normal subjects were challenged with ascending doses of histamine and Rnaw and lavage fluid total protei
APA, Harvard, Vancouver, ISO, and other styles
41

Jiang, D., and D. C. Flyer. "Immune response to Moloney murine leukemia virus nonviral, tumor-associated antigens fails to provide in vivo tumor protection." Journal of Immunology 148, no. 3 (1992): 974–80. http://dx.doi.org/10.4049/jimmunol.148.3.974.

Full text
Abstract:
Abstract Two distinct populations of CTL have previously been shown to be generated in lymphocyte cultures derived from the spleens of C57BL/6 mice that have rejected Moloney murine leukemia virus:Moloney sarcoma virus (MoMuLV:MSV)-induced tumors. One population is specific for MoMuLV viral Ag whereas the other appears to be directed against a nonviral, tumor-associated Ag (TAA). Using a virus-negative variant of the MoMuLV-induced lymphoma MBL-2 that has retained the expression of the MuLV:TAA, we attempted to further characterize the MuLV:TAA-specific CTL population. First, this same pattern
APA, Harvard, Vancouver, ISO, and other styles
42

Alvarez, Sandy, Jennifer Bartlett, Nicolette Pollock, Jessica Vazquez, Paul McCray, and Edith Porter. "Challenge with Staphylococcus aureus induces a lipid response in newborn piglets." Journal of Immunology 196, no. 1_Supplement (2016): 68.14. http://dx.doi.org/10.4049/jimmunol.196.supp.68.14.

Full text
Abstract:
Abstract The innate immune system provides the first line of defense against microbes. Epithelial cells recognize pathogen-associated molecular patterns and detection leads to induction of antimicrobial peptides, proinflammatory cytokines, and chemokines. Recent evidence suggests that antimicrobial lipids, including fatty acids and cholesteryl esters, are also important effectors in the innate mucosal defense of the airways. We have previously shown that cholesteryl linoleate and cholesteryl arachidonate are active against Pseudomonas aeruginosa and other bacteria, and that the expression of S
APA, Harvard, Vancouver, ISO, and other styles
43

Liu, Hongyu, Leiting Chen, Zahra Davar, and Mohammad Pour. "Insecurity of an Efficient Privacy-preserving Public Auditing Scheme for Cloud Data Storage." JUCS - Journal of Universal Computer Science 21, no. (3) (2015): 473–82. https://doi.org/10.3217/jucs-021-03-0473.

Full text
Abstract:
Cloud storage has a long string of merits but at the same time, poses many challenges on data integrity and privacy. A cloud data auditing protocol, which enables a cloud server to prove the integrity of stored files to a verifier, is a powerful tool for secure cloud storage. Wang et al. proposed a privacy-preserving public auditing protocol, however, Worku et al. found the protocol is seriously insecure and proposed an improvement to remedy the weakness. In this paper, unfortunately, we demonstrate that the new protocol due to Worku et al. fails to achieve soundness and obtains merely limited
APA, Harvard, Vancouver, ISO, and other styles
44

Su, S. D., M. M. Ward, M. A. Apicella, and R. E. Ward. "The primary B cell response to the O/core region of bacterial lipopolysaccharide is restricted to the Ly-1 lineage." Journal of Immunology 146, no. 1 (1991): 327–31. http://dx.doi.org/10.4049/jimmunol.146.1.327.

Full text
Abstract:
Abstract Experiments were performed to test the hypothesis that Ly-1 B cells respond to antigenic challenge with LPS from gram-negative bacteria. To perform these experiments, the splenic fragment culture system for the study of B cell precursors was used. We found that a significant number of anti-O/core, but not anti-lipid A, precursors expressed the lambda L chain. A restriction of the anti-LPS response to Ly-1 B cells was tested using a Ly-1 depletion protocol. We found that the anti-O/core antibody response was restricted to the Ly-1 B cell lineage. In contrast, conventional B cells, not
APA, Harvard, Vancouver, ISO, and other styles
45

Guzmán-López, María H., Susana Sánchez-León, Miriam Marín-Sanz, et al. "Oral Consumption of Bread from an RNAi Wheat Line with Strongly Silenced Gliadins Elicits No Immunogenic Response in a Pilot Study with Celiac Disease Patients." Nutrients 13, no. 12 (2021): 4548. http://dx.doi.org/10.3390/nu13124548.

Full text
Abstract:
Celiac disease (CD) is a genetically predisposed, T cell-mediated and autoimmune-like disorder caused by dietary exposure to the storage proteins of wheat and related cereals. A gluten-free diet (GFD) is the only treatment available for CD. The celiac immune response mediated by CD4+ T-cells can be assessed with a short-term oral gluten challenge. This study aimed to determine whether the consumption of bread made using flour from a low-gluten RNAi wheat line (named E82) can activate the immune response in DQ2.5-positive patients with CD after a blind crossover challenge. The experimental prot
APA, Harvard, Vancouver, ISO, and other styles
46

Sorkness, R., K. Johns, W. L. Castleman, and R. F. Lemanske. "Late pulmonary allergic responses in actively but not passively IgE-sensitized rats." Journal of Applied Physiology 69, no. 3 (1990): 1012–21. http://dx.doi.org/10.1152/jappl.1990.69.3.1012.

Full text
Abstract:
Previous studies suggested that although rats that were passively sensitized [monoclonal murine immunoglobulin E (IgE)] would respond to pulmonary antigen challenge with an immediate increase in resistance, they exhibited no late increases in resistance, unlike late changes in rats actively sensitized to preferentially produce IgE antibody. We hypothesized that passively sensitized rats also would not develop antigen-induced pulmonary inflammation. In a blinded protocol we compared immediate responses and pulmonary resistance and inflammation at 8, 19 and 24 h after challenge with placebo anti
APA, Harvard, Vancouver, ISO, and other styles
47

Ananda, Pratama, Bambang Pujo Semedi, Christrijogo Sumartono Waloejo, and Arie Utariani. "Opioid-Sparring and Multimodal Analgesia as Parts of Enhanced Recovery After Surgery (ERAS) Applied In The Ksatria Airlangga Floating Hospital." Indonesian Journal of Anesthesiology and Reanimation 3, no. 1 (2021): 17. http://dx.doi.org/10.20473/ijar.v3i12021.17-21.

Full text
Abstract:
Introduction: Enhanced Recovery After Surgery (ERAS) protocol is a perioperative multimodal service program designed to achieve a faster surgical recovery period and a better outcome, the key in reducing morbidity in surgery is by reducing the “surgical injury” and reducing the body’s stress response caused by the surgery. The success of the ERAS protocol depends on the interpretation and collaboration of the multidisciplinary team, therefore though the protocol is carried out in a hospital that has sufficient facilities and resources, the obstacle in the implementation of ERAS can still happe
APA, Harvard, Vancouver, ISO, and other styles
48

Deng, Xia, Junbin Shao, Le Chang, and Junbin Liang. "A Blockchain-Based Authentication Protocol Using Cryptocurrency Technology in LEO Satellite Networks." Electronics 10, no. 24 (2021): 3151. http://dx.doi.org/10.3390/electronics10243151.

Full text
Abstract:
With the rapid development of satellite technology and the high transmission efficiency of LEO satellites, LEO satellite communication has received increasing attention. However, the frequent switching of satellite-earth links imposes a great challenge in LEO communication authentication. To tackle this challenge, this paper proposes a Blockchain-based Authentication Protocol Using Cryptocurrency Technology (BAPC), which solves the problem of a long pause time of satellite services caused by user access authentication in a scenario of frequent switching between satellites and ground users. Fir
APA, Harvard, Vancouver, ISO, and other styles
49

Kraemer, W. J., J. E. Dziados, L. J. Marchitelli, et al. "Effects of different heavy-resistance exercise protocols on plasma beta-endorphin concentrations." Journal of Applied Physiology 74, no. 1 (1993): 450–59. http://dx.doi.org/10.1152/jappl.1993.74.1.450.

Full text
Abstract:
To examine the changes of plasma beta-endorphin (beta-EP) concentrations in response to various heavy-resistance exercise protocols, eight healthy male subjects randomly performed each of six heavy-resistance exercise protocols, which consisted of identically ordered exercises carefully designed to control for the repetition maximum (RM) resistance (5 vs. 10 RM), rest period length (1 vs. 3 min), and total work (joules). Plasma beta-EP, ammonia, whole blood lactate and serum cortisol, creatine kinase, urea, and creatinine were determined preexercise, midexercise, immediately postexercise, and
APA, Harvard, Vancouver, ISO, and other styles
50

Tanner, Ernest, Ji Tae Choung, J. Swarts, Christine De Vos, and Philip Fireman. "Effect of Topical ucb 28754 on Rhinitis Provoked by Intranasal Histamine and Ascaris Suum in the Monkey." American Journal of Rhinology 10, no. 1 (1996): 45–50. http://dx.doi.org/10.2500/105065896781795102.

Full text
Abstract:
A monkey model was used to evaluate intranasal ucb-28754, a newly developed H1 antagonist in attenuating nasal obstruction following intranasal challenge with either histamine or Ascaris in a dose response protocol. Nasal patency was measured with computer assisted anterior rhinomanometry. Eight female, feral, Ascaris sensitive, juvenile cynomolgus monkeys were pretreated with 100 ul of 0.075% ucb-28754 or placebo in a crossover study protocol before intranasal histamine provocation. Three of the animals also received 100 ul of 0.075% or 0.3% ucb-28754 or placebo before intranasal Ascaris chal
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!