To see the other types of publications on this topic, follow the link: FIDO2.

Journal articles on the topic 'FIDO2'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'FIDO2.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ou, Hsia-Hung, Chien-Hsiu Pan, Yang-Ming Tseng, and Iuon-Chang Lin. "Decentralized Identity Authentication Mechanism: Integrating FIDO and Blockchain for Enhanced Security." Applied Sciences 14, no. 9 (2024): 3551. http://dx.doi.org/10.3390/app14093551.

Full text
Abstract:
FIDO (Fast Identity Online) is a set of network identity standards established by the FIDO Alliance. It employs a framework based on public key cryptography to facilitate multi-factor authentication (MFA) and biometric login, ensuring the robust protection of personal data associated with cloud accounts and ensuring the security of server-to-terminal device protocols during the login process. The FIDO Alliance has established three standards: FIDO Universal Second Factor (FIDO U2F), FIDO Universal Authentication Framework (FIDO UAF), and the Client to Authenticator Protocols (CTAP). The newer
APA, Harvard, Vancouver, ISO, and other styles
2

M, Ms Sumi. "FIDO2 Passkey: The Passwordless Future." International Journal for Research in Applied Science and Engineering Technology 12, no. 3 (2024): 2838–47. http://dx.doi.org/10.22214/ijraset.2024.59504.

Full text
Abstract:
Abstract: FIDO2 passkeys represent a transformative step towards a passwordless future. This technology, developed by the FIDO Alliance, offers a user-friendly, secure, and privacy-preserving solution to the problem of password management. By leveraging public key cryptography and biometric or device-based authentication methods, FIDO2 passkeys eliminate the need for traditional, easy-to-forget, and often insecure passwords. The adoption of this technology could significantly enhance online security, reduce instances of identity theft, and streamline the user experience across various digital
APA, Harvard, Vancouver, ISO, and other styles
3

Kutyłowski, Mirosław, Anna Lauks-Dutka, Przemysław Kubiak, and Marcin Zawada. "FIDO2 Facing Kleptographic Threats By-Design." Applied Sciences 14, no. 23 (2024): 11371. https://doi.org/10.3390/app142311371.

Full text
Abstract:
We analyze the popular in practice FIDO2 authentication scheme from the point of view of kleptographic threats that have not been addressed so far in the literature. We show that despite its spartan design and apparent efforts to make it immune to dishonest protocol participants, the unlinkability features of FIDO2 can be effectively broken without a chance to detect it by observing protocol executions. Moreover, we show that a malicious authenticator can enable an adversary to seize the authenticator’s private keys, thereby enabling the impersonation of the authenticator’s owner. As a few com
APA, Harvard, Vancouver, ISO, and other styles
4

Researcher. "FIDO2: A NEW ERA IN SECURE WEB AUTHENTICATION." International Journal of Computer Engineering and Technology (IJCET) 15, no. 4 (2024): 841–58. https://doi.org/10.5281/zenodo.13479154.

Full text
Abstract:
FIDO2 represents a paradigm shift in web authentication, addressing the longstanding vulnerabilities associated with traditional password-based systems. This article provides a comprehensive overview of FIDO2, exploring its technical architecture, security features, implementation challenges, and potential impact on cybersecurity. By leveraging public key cryptography and enabling passwordless authentication, FIDO2 offers robust protection against phishing, credential stuffing, and server-side breaches. The standard's integration of biometric factors and its alignment with privacy regulations
APA, Harvard, Vancouver, ISO, and other styles
5

Researcher. "FIDO2: A NEW ERA IN SECURE WEB AUTHENTICATION." International Journal of Computer Engineering and Technology (IJCET) 15, no. 4 (2024): 841–58. https://doi.org/10.5281/zenodo.13479154.

Full text
Abstract:
FIDO2 represents a paradigm shift in web authentication, addressing the longstanding vulnerabilities associated with traditional password-based systems. This article provides a comprehensive overview of FIDO2, exploring its technical architecture, security features, implementation challenges, and potential impact on cybersecurity. By leveraging public key cryptography and enabling passwordless authentication, FIDO2 offers robust protection against phishing, credential stuffing, and server-side breaches. The standard's integration of biometric factors and its alignment with privacy regulations
APA, Harvard, Vancouver, ISO, and other styles
6

Researcher. "FIDO2: A NEW ERA IN SECURE WEB AUTHENTICATION." International Journal of Computer Engineering and Technology (IJCET) 15, no. 4 (2024): 841–58. https://doi.org/10.5281/zenodo.13479154.

Full text
Abstract:
FIDO2 represents a paradigm shift in web authentication, addressing the longstanding vulnerabilities associated with traditional password-based systems. This article provides a comprehensive overview of FIDO2, exploring its technical architecture, security features, implementation challenges, and potential impact on cybersecurity. By leveraging public key cryptography and enabling passwordless authentication, FIDO2 offers robust protection against phishing, credential stuffing, and server-side breaches. The standard's integration of biometric factors and its alignment with privacy regulations
APA, Harvard, Vancouver, ISO, and other styles
7

Researcher. "FIDO2: A NEW ERA IN SECURE WEB AUTHENTICATION." International Journal of Computer Engineering and Technology (IJCET) 15, no. 4 (2024): 841–58. https://doi.org/10.5281/zenodo.13479154.

Full text
Abstract:
FIDO2 represents a paradigm shift in web authentication, addressing the longstanding vulnerabilities associated with traditional password-based systems. This article provides a comprehensive overview of FIDO2, exploring its technical architecture, security features, implementation challenges, and potential impact on cybersecurity. By leveraging public key cryptography and enabling passwordless authentication, FIDO2 offers robust protection against phishing, credential stuffing, and server-side breaches. The standard's integration of biometric factors and its alignment with privacy regulations
APA, Harvard, Vancouver, ISO, and other styles
8

Researcher. "FIDO2: A NEW ERA IN SECURE WEB AUTHENTICATION." International Journal of Computer Engineering and Technology (IJCET) 15, no. 4 (2024): 841–58. https://doi.org/10.5281/zenodo.13479154.

Full text
Abstract:
FIDO2 represents a paradigm shift in web authentication, addressing the longstanding vulnerabilities associated with traditional password-based systems. This article provides a comprehensive overview of FIDO2, exploring its technical architecture, security features, implementation challenges, and potential impact on cybersecurity. By leveraging public key cryptography and enabling passwordless authentication, FIDO2 offers robust protection against phishing, credential stuffing, and server-side breaches. The standard's integration of biometric factors and its alignment with privacy regulations
APA, Harvard, Vancouver, ISO, and other styles
9

Rivera-Dourado, Martiño, Marcos Gestal, Alejandro Pazos, and Jose Vázquez-Naya. "A Novel Protocol Using Captive Portals for FIDO2 Network Authentication." Applied Sciences 14, no. 9 (2024): 3610. http://dx.doi.org/10.3390/app14093610.

Full text
Abstract:
FIDO2 authentication is starting to be applied in numerous web authentication services, aiming to replace passwords and their known vulnerabilities. However, this new authentication method has not been integrated yet with network authentication systems. In this paper, we introduce FIDO2CAP: FIDO2 Captive-portal Authentication Protocol. Our proposal describes a novel protocol for captive-portal network authentication using FIDO2 Authenticators as security keys and passkeys. For validating our proposal, we have developed a prototype of FIDO2CAP authentication in a mock scenario. Using this proto
APA, Harvard, Vancouver, ISO, and other styles
10

Rivera-Dourado, Martiño, M. Gestal, A. Pazos, and José Vázquez-Naya. "A Novel Protocol Using Captive Portals for FIDO2 Network Authentication." Applied sciences 14, no. 9 (2024): 3610. https://doi.org/10.3390/app14093610.

Full text
Abstract:
FIDO2 authentication is starting to be applied in numerous web authentication services, aiming to replace passwords and their known vulnerabilities. However, this new authentication method has not been integrated yet with network authentication systems. In this paper, we introduce FIDO2CAP: FIDO2 Captive-portal Authentication Protocol. Our proposal describes a novel protocol for captive-portal network authentication using FIDO2 Authenticators as security keys and passkeys. For validating our proposal, we have developed a prototype of FIDO2CAP authentication in a mock scenario. Using this proto
APA, Harvard, Vancouver, ISO, and other styles
11

R M, Bhavana. "Fast Identity Online 2 :Authentication Technique." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem34662.

Full text
Abstract:
Fast Identity Online 2 (FIDO2) emerges as a transformative solution to the vulnerabilities inherent in traditional password-based authentication methods. Leveraging public key cryptography and authenticators, it establishes a passwordless authentication paradigm, extending its relevance beyond web applications to diverse realms such as online payments and government services. This paper explores FIDO2's emphasis on a seamless user experience while bolstering security measures through innovative credential management techniques. The acceptance of FIDO2 on major browsers ensures its usability on
APA, Harvard, Vancouver, ISO, and other styles
12

Rivera-Dourado, Martiño, Christos Xenakis, Alejandro Pazos, and Jose Vázquez-Naya. "EAP-FIDO: A novel EAP method for using FIDO2 credentials for network authentication." Computer Networks 266 (July 2025): 111348. https://doi.org/10.1016/j.comnet.2025.111348.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Mitra, Aditya, and Anisha Ghosh. "FIDO2: A comprehensive study on passwordless authentication." International Journal of Engineering Research and Applications 14, no. 7 (2024): 58–63. http://dx.doi.org/10.9790/9622-14075863.

Full text
Abstract:
The twenty first century is marked as the digital era. It involves the use of computers and other devices like smartphones in every aspect of life. It is becoming increasingly important to understand the usages of such devices and to protect ourselves from malicious actors on digital platforms. The concept of authentication is not new, it started with Fernando Corbató in the 1960s when he developed the system of passwords for the MIT Compatible Time-Sharing System (CTSS) [1]. However, we have come a long way from using passwords and personal identification numbers (PINs) since they have fallen
APA, Harvard, Vancouver, ISO, and other styles
14

Zhidovich, A. A., A. A. Lubenko, and I. S. Vojteshenko. "Prototyping of the system of passwordless attributive access to information resources using eID-card of the Republic of Belarus and FIDO2-authentication." Informatics 22, no. 2 (2025): 95–110. https://doi.org/10.37661/816-0301-2025-22-2-95-110.

Full text
Abstract:
Objectives. The purpose of the analytical and research work carried out is to design and implement a prototype system for establishing user identity and privileges based on the joint use of passwordless FIDO2 authentication and attribute-based access control. It is proposed that electronic identification means compliant with ICAO standards be used as a source of user attributes.Methods. The following were used in this paper: systematization and analysis of literature and technical specifications; systematic approach to the analysis of existing implementations of passwordless attribute access s
APA, Harvard, Vancouver, ISO, and other styles
15

Dunkelberger, Phil. "FIDO2 puts biometrics at heart of web security." Biometric Technology Today 2018, no. 8 (2018): 8–10. http://dx.doi.org/10.1016/s0969-4765(18)30126-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Kepkowski, Michal, Lucjan Hanzlik, Ian Wood, and Mohamed Ali Kaafar. "How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy." Proceedings on Privacy Enhancing Technologies 2022, no. 4 (2022): 705–26. http://dx.doi.org/10.56553/popets-2022-0129.

Full text
Abstract:
This paper presents a timing attack on the FIDO2 (Fast IDentity Online) authentication protocol that allows attackers to link user accounts stored in vulnerable authenticators, a serious privacy concern. FIDO2 is a new standard specified by the FIDO industry alliance for secure token online authentication. It complements the W3C WebAuthn specification by providing means to use a USB token or other authenticator (which holds the secret authenticating material and implements FIDO protocols) as a second factor during the authentication process. From a cryptographic perspective, the protocol is a
APA, Harvard, Vancouver, ISO, and other styles
17

Karim, Nader Abdel, Hasan Kanaker, Waleed K. Abdulraheem, Majdi Ali Ghaith, Essam Alhroob, and Abdulla Mousa Falah Alali. "Choosing the right MFA method for online systems: A comparative analysis." International Journal of Data and Network Science 8, no. 1 (2024): 201–12. http://dx.doi.org/10.5267/j.ijdns.2023.10.003.

Full text
Abstract:
A robust authentication method is needed to protect online user accounts and data from cyber-attacks. Using only passwords is insufficient because they can be easily stolen or cracked. Multi-factor authentication (MFA) increases security by requiring two or more verification factors from the user before granting access to a resource such as an online account or an application. MFA is essential to a strong identity and access management (IAM) policy. This study evaluates and contrasts several MFA methods for online systems, including Microsoft Authenticator, FIDO2 security keys, SMS, voice call
APA, Harvard, Vancouver, ISO, and other styles
18

Xu, Peng, Ruijie Sun, Wei Wang, Tianyang Chen, Yubo Zheng, and Hai Jin. "SDD: A trusted display of FIDO2 transaction confirmation without trusted execution environment." Future Generation Computer Systems 125 (December 2021): 32–40. http://dx.doi.org/10.1016/j.future.2021.06.034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Sethuraman, Sibi Chakkaravarthy, Aditya Mitra, Anisha Ghosh, Rishita Shaw, Aswani Kumar Cherukuri, and Firuz Kamalov. "Conceptual design and implementation of FIDO2 compatible smart medical card for healthcare information system." International Journal of Critical Computer-Based Systems 11, no. 1/2 (2024): 68–90. http://dx.doi.org/10.1504/ijccbs.2024.139105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Bibhu, Dash, and Ullah Sameeh. "Quantum-safe: Cybersecurity in the age of Quantum-Powered AI." World Journal of Advanced Research and Reviews 21, no. 1 (2024): 1555–63. https://doi.org/10.5281/zenodo.13323635.

Full text
Abstract:
There is a lot of talk about how the cyber world will change and perceive itself as quantum computing takes center stage in the computing industry in a decade. While some are enthusiastic about the advancement of quantum technology, others remain skeptical about its application in cyberspace. But there is no doubt the interaction of artificial intelligence (AI) and quantum computing offers cybersecurity both tremendous benefits and difficulties as we navigate the digital terrain. This article explores the complex interrelationship between these two state-of-the-art technologies and how it affe
APA, Harvard, Vancouver, ISO, and other styles
21

Krishnapatnam, Mahendra. "Next-Generation Identity Security in Healthcare: A Passkey-Based Approach." International Journal of Computing and Engineering 7, no. 3 (2025): 23–33. https://doi.org/10.47941/ijce.2701.

Full text
Abstract:
The healthcare industry faces escalating cybersecurity threats, particularly targeting identity and access management (IAM) systems reliant on vulnerable password-based authentication. This paper proposes a next-generation solution leveraging passkeys, based on FIDO2 and WebAuthn protocols, to establish a passwordless authentication framework. We explore the technical architecture, device-bound authentication mechanisms, interoperability challenges, and compliance with HIPAA and NIST standards. Through case study analysis and industry benchmarking, we demonstrate that passkey adoption signific
APA, Harvard, Vancouver, ISO, and other styles
22

Researcher. "PASSKEYS AND THE PARADIGM SHIFT IN AUTHENTICATION: A COMPREHENSIVE ANALYSIS OF PHISHING-RESISTANT IAM." International Journal of Research In Computer Applications and Information Technology (IJRCAIT) 7, no. 2 (2024): 723–35. https://doi.org/10.5281/zenodo.14035089.

Full text
Abstract:
This article examines the emergence of passkeys as a revolutionary authentication method in the Identity and Access Management (IAM) field. As cybersecurity threats evolve, traditional password-based systems have proven increasingly vulnerable to phishing attacks, credential stuffing, and other security breaches. Passkeys, leveraging public-key cryptography and the FIDO2 standard, offer a promising solution by providing phishing-resistant, user-friendly, and device-bound authentication. This article comprehensively analyzes passkey technology, exploring its functionality, advantages over tradi
APA, Harvard, Vancouver, ISO, and other styles
23

Uday Pioneer Kola. "Dynamic Tokenization for Next-Gen Payment Security: A Self-Evolving Approach." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1575–88. https://doi.org/10.32628/cseit25112488.

Full text
Abstract:
This comprehensive article explores dynamic tokenization as a transformative security approach in digital payment systems. Starting with evaluating traditional static tokenization's inherent vulnerabilities, the article establishes how these limitations have enabled sophisticated cyber attacks, resulting in substantial financial losses globally. It then introduces dynamic tokenization as a paradigm shift that creates continuously evolving tokens based on contextual factors, demonstrating enhanced protection against modern threats. The article further analyzes how integrating dynamic tokenizati
APA, Harvard, Vancouver, ISO, and other styles
24

Kedarnath Goud Kothinti. "Mitigating One-Time Passcode (OTP) Fraud: Strengthening authentication against emerging threats." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 1368–78. https://doi.org/10.30574/wjarr.2025.26.1.1181.

Full text
Abstract:
This article provides a comprehensive examination of the evolving threat landscape surrounding One-Time Passcode (OTP) fraud in financial services and presents advanced mitigation strategies to strengthen authentication security. As financial institutions increasingly rely on OTP-based authentication methods, sophisticated threat actors have developed effective techniques to bypass these security measures through SIM swapping, man-in-the-middle attacks, social engineering, and telecom-level vulnerabilities. The article analyzes these attack vectors while evaluating emerging countermeasures, in
APA, Harvard, Vancouver, ISO, and other styles
25

Farao, Aristeidis, Eleni Veroni, Christoforos Ntantogian, and Christos Xenakis. "P4G2Go: A Privacy-Preserving Scheme for Roaming Energy Consumers of the Smart Grid-to-Go." Sensors 21, no. 8 (2021): 2686. http://dx.doi.org/10.3390/s21082686.

Full text
Abstract:
Due to its flexibility in terms of charging and billing, the smart grid is an enabler of many innovative energy consumption scenarios. One such example is when a landlord rents their property for a specific period to tenants. Then the electricity bill could be redirected from the landlord’s utility to the tenant’s utility. This novel scenario of the smart grid ecosystem, defined in this paper as Grid-to-Go (G2Go), promotes a green economy and can drive rent reductions. However, it also creates critical privacy issues, since utilities may be able to track the tenant’s activities. This paper pre
APA, Harvard, Vancouver, ISO, and other styles
26

Poh, J., and J. Brimacombe. "A Comparison of the T-Piece, Venturi T-Piece and T-Bag for Emergence with the Laryngeal Mask." Anaesthesia and Intensive Care 26, no. 5 (1998): 526–28. http://dx.doi.org/10.1177/0310057x9802600509.

Full text
Abstract:
We have compared the performance of a standard T-piece, a Venturi T-piece and a T-bag (T-piece with a small reservoir bag) for emergence with the laryngeal mask airway in 20 awake volunteers. FiO2, ETCO2 and FiCO2 were measured at oxygen flow rates of 2, 4 and 6 l.min-1 during three different breathing patterns: normal tidal volume, respiratory rate 12 .min-1; normal tidal volume, respiratory rate 20 .min-1; high tidal volume, respirutory rate 12 .min-1. The T-piece and T-bag delivered a higher overall average FiO2 than the Venturi T-piece (P<0.00001). Compared with normal breathing, FiO2 w
APA, Harvard, Vancouver, ISO, and other styles
27

Srivaramangai, Ramanujam. "A Comprehensive Approach for Harnessing Entanglement for Next-Generation Authentication: From Passwords to Qubits." International Journal of Emerging Science and Engineering (IJESE) 13, no. 5 (2025): 21–31. https://doi.org/10.35940/ijese.D2593.13050425.

Full text
Abstract:
<strong>Abstract:</strong> Traditional authentication mechanisms, such as password-based systems and multi-factor authentication (MFA), face escalating vulnerabilities in an era marked by sophisticated cyberattacks, quantum computing advancements, and evolving regulatory demands. Passwords, inherently prone to phishing, brute-force attacks, and credential reuse, remain a weak link in cybersecurity despite decades of incremental improvements. Meanwhile, emerging technologies like quantum computing threaten to dismantle classical cryptographic protocols, necessitating a paradigm shift in authent
APA, Harvard, Vancouver, ISO, and other styles
28

Barnas, G. M., and W. Rautenberg. "Shivering and cardiorespiratory responses during normocapnic hypoxia in the pigeon." Journal of Applied Physiology 68, no. 1 (1990): 84–87. http://dx.doi.org/10.1152/jappl.1990.68.1.84.

Full text
Abstract:
To study the inhibitory effect of hypoxia on the cold defense mechanism, pigeons were exposed at low ambient temperature (5 degrees C) to various inhaled gas mixtures: normoxia [0.21 fractional concentration of O2 (FIO2)], hypoxia (0.07 FIO2), and normocapnic hypoxia (0.07 FIO2 + 0.045 FICO2). Electromyographic (EMG) activity indicative of shivering thermogenesis was inhibited during hypoxia, and body temperature (Tre) fell by 0.09 degrees C/min. Respiratory frequency (f) and minute ventilation (VE) increased by 143 and 135%, respectively, compared with normoxia, but tidal volume (VT) was not
APA, Harvard, Vancouver, ISO, and other styles
29

Triantaris, Apostolos, Isaak Aidonidis, Apostolia Hatziefthimiou, Konstantinos Gourgoulianis, Georgios Zakynthinos, and Demosthenes Makris. "Elevated PaCO2 levels increase pulmonary artery pressure." Science Progress 105, no. 2 (2022): 003685042210941. http://dx.doi.org/10.1177/00368504221094161.

Full text
Abstract:
Permissive hypercapnia is commonly used in mechanically ventilated patients to avoid lung injury but its effect on pulmonary artery pressure (PAP) is still unclear, particularly in combination with tidal volume (Vt). Therefore, an in vivo study was performed on adult rabbits ventilated with low (9 ml/Kg, LVt group) or high (15 ml/Kg, HVt group) tidal volume (Vt) and alterations in PAP were estimated. Both groups of animals initially were ventilated with FiO2 0.3 (Normocapnia-1) followed by inhalation of enriched CO2 gas mixture (FiCO2 0.10) to develop hypercapnia (Hypercapnia-1). After 30 min
APA, Harvard, Vancouver, ISO, and other styles
30

Vigil-Hayes, Morgan, Elizabeth Belding, and Ellen Zegura. "FiDO." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1, no. 3 (2017): 1–25. http://dx.doi.org/10.1145/3132030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Schiffer, Stephen. "The `Fido'-Fido Theory of Belief." Philosophical Perspectives 1 (1987): 455. http://dx.doi.org/10.2307/2214153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Lazard, Jackson L., Gerald L. Wolf, Jean Charchaflieh, and George W. Sidebotham. "Surgical Drape Combustion in FIO2=0.21, FIO2=0.50 and FIO2=0.95." Anesthesiology 2001, no. 3 (2001): B24. http://dx.doi.org/10.1097/00000542-200109001-00024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Canet, E., J. L. Carroll, and M. A. Bureau. "Hypoxia-induced periodic breathing in newborn lambs." Journal of Applied Physiology 67, no. 3 (1989): 1226–33. http://dx.doi.org/10.1152/jappl.1989.67.3.1226.

Full text
Abstract:
This study was designed to elucidate the effect of hypoxia on the breathing rhythmicity and the effect of hypoxia on periodic breathing (PB) in two groups of newborn lambs (less than 2 days and 10 days of age). Lambs undergoing a hypoxic ventilatory test [0.08 inspired O2 fraction (FIo2) for 13 min] experienced no apnea or PB in hypoxia, but all developed PB during the 1-min period immediately after their abrupt return to 0.21 FIo2. This PB occurred when alternation of arterial PO2 and PCO2 in mild hypoxic and hypocapnic conditions induced an overshoot-undershoot response of the chemical drive
APA, Harvard, Vancouver, ISO, and other styles
34

Cain, John R., Laura M. Parkes, Peter Eadsforth, Susan C. Beards, and Alan Jackson. "Impact of Gas Delivery Systems on Imaging Studies of Human Cerebral Blood Flow." Radiology Research and Practice 2013 (2013): 1–5. http://dx.doi.org/10.1155/2013/694803.

Full text
Abstract:
Purpose. To compare a semiopen breathing circuit with a non-rebreathing (Hudson mask) for MRI experiments involving gas delivery.Methods and Materials. Cerebral blood flow (CBF) was measured by quantitative phase contrast angiography of the internal carotid and basilar arteries in 18 volunteers (20–31 years). In 8 subjects, gases were delivered via a standard non-rebreathing (Hudson mask). In 10 subjects, gases were delivered using a modified “Mapleson A” semiopen anesthetic gas circuit and mouthpiece. All subjects were given 100% O2, medical air, and carbogen gas (95% O2and 5% CO2) delivered
APA, Harvard, Vancouver, ISO, and other styles
35

Fidotta, Giuseppe. "Animated maps and the power of the trace." NECSUS. European Journal of Media Studies 3, no. 1 (2014): 267–98. http://dx.doi.org/10.5117/necsus2014.1.fido.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Mendelsohn, Adam D. "Fido Judaeus." American Jewish History 101, no. 1 (2017): 84–86. http://dx.doi.org/10.1353/ajh.2017.0008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Helms, Roger. "Fido Siddhartha." After Dinner Conversation 6, no. 2 (2025): 87–101. https://doi.org/10.5840/adc20256218.

Full text
Abstract:
Is it better to be happy, or “normal?” Henry is a 12-year-old boy with severe autism. He is nonverbal and has limited social interaction. His main source of joy is playing fetch with his dog, Too. When Too dies, Henry becomes depressed and refuses to play fetch with a new dog. He eventually starts playing fetch by himself, throwing and retrieving the stick. Henry's parents are considering enrolling him in a special program that could potentially cure his autism. However, they are concerned about the potential side effects and the possibility that Henry will no longer be happy after the treatme
APA, Harvard, Vancouver, ISO, and other styles
38

Schelkun, Patrice Heinz. "Fearsome Fido." Physician and Sportsmedicine 21, no. 4 (1993): 142–50. http://dx.doi.org/10.1080/00913847.1993.11710370.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Hortúa–Pulido, Jorge Raúl, Paula María Bermúdez–Duarte, Ernesto Andrés Dalmau–Barros, Juan Carlos Mancipe, and Edgar Iván Martín–Abaunza. "Correlación de PaO2/FiO2, SaO2/FiO2 y SpO2/FiO2 en caninos sanos ubicados a elevada altitud." Revista Científica de la Facultad de Ciencias Veterinarias 35, no. 1 (2025): 7. https://doi.org/10.52973/rcfcv-e35524.

Full text
Abstract:
La presión arterial de oxígeno (PaO2) disminuye a medida que se incrementa la altitud sobre el nivel del mar. Los valores esperados de saturación arterial de oxígeno (SaO2) y otros índices respiratorios dependientes de la PaO2 se modifican con la altitud, al igual que la saturación periférica de oxígeno (SpO2). Actualmente existen pocos datos publicados sobre índices de función pulmonar en el contexto clínico de caninos que viven a elevada altitud respirando una fracción inspirada de oxígeno (FiO2) de 21 %. El objetivo de este estudio fue identificar los valores de PaO2/FiO2 (PF), SaO2/FiO2 (S
APA, Harvard, Vancouver, ISO, and other styles
40

Dunningham, H., C. Borland, F. Bottrill, A. Vuylsteke, and D. Gordon. "Modelling lung and tissue diffusion using a membrane oxygenator circuit." Perfusion 22, no. 4 (2007): 231–38. http://dx.doi.org/10.1177/0267659107083240.

Full text
Abstract:
A simple model lung has been designed using a membrane oxygenator circuit comprising two membrane oxygenators primed with one to two litres of equine blood, giving reproducible results over several hours. Normoxia and normocapnia were achieved consistently over the duration of the test with a blood flow of 2.5 l/min, oxygenator ventilation gas flow of 5 l/min air with 0.3 l/min O2 and deoxygenator ventilation gas flow of 5 l/min 5% CO2 in N2 with 0.2 l/min CO 2. The measured PaO2 was 81.3 (SD 3.35 mmHg), PvO2 38.3 (SD 1.38 mmHg), PvCO2 60.6 (SD 1.13 mmHg) and PaCO2 36.1 (SD 0.69 mmHg). MO2 and
APA, Harvard, Vancouver, ISO, and other styles
41

Harris, Ellen T., George Frideric Handel, Giacomo Rossi, et al. "Il pastor fido." Notes 54, no. 2 (1997): 542. http://dx.doi.org/10.2307/899560.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Weaver, Elissa. "Remembering Franco Fido." Italian Culture 39, no. 1 (2021): 111–12. http://dx.doi.org/10.1080/01614622.2021.1909930.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Nesti, Fido. "Entrevista Fido Nesti." Intelligere, no. 13 (October 27, 2022): 77–79. http://dx.doi.org/10.11606/issn.2447-9020.intelligere.2022.203739.

Full text
Abstract:
O ilustrador Fido Nesti iniciou a sua carreira na década de 1980. Venceu, na categoria Melhor Adaptação, a edição de 2022 do Prêmio Eisner (considerado o Oscar dos quadrinhos), com o seu trabalho na adaptação da obra 1984 de George Orwell. A obra foi publicada no Brasil em 2019, pela Companhia das Letras.&#x0D;
APA, Harvard, Vancouver, ISO, and other styles
44

M, Steve. "Et Tu, Fido?" Scientific American 320, no. 5 (2019): 86. http://dx.doi.org/10.1038/scientificamerican0519-86.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Aboab, Jerome, Bruno Louis, Bjorn Jonson, and Laurent Brochard. "Relation between PaO2/FIO2 ratio and FIO2: a mathematical description." Intensive Care Medicine 32, no. 10 (2006): 1494–97. http://dx.doi.org/10.1007/s00134-006-0337-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Lee, Byoungcheon. "Certified Key Management in Multi K-FIDO Device Environment." Journal of the Korea Institute of Information Security and Cryptology 27, no. 2 (2017): 293–303. http://dx.doi.org/10.13089/jkiisc.2017.27.2.293.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Dragnea, D., and G. Daniel. "Blocked scavenging causing increased Fico2." Anaesthesia 64, no. 3 (2009): 336. http://dx.doi.org/10.1111/j.1365-2044.2009.05881.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Tittle, Peg. "No friend of Fido." Philosophers' Magazine, no. 10 (2000): 54. http://dx.doi.org/10.5840/tpm20001064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Akca, Ozan, Lorenzo Ball, F. Javier Belda, et al. "WHO Needs High FIO2?" Turkish Journal of Anesthesia and Reanimation 45, no. 4 (2017): 181–92. http://dx.doi.org/10.5152/tjar.2017.250701.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Jarvis, Suzanne. "No chocolate for Fido." Veterinary Record 181, no. 25 (2017): 665. http://dx.doi.org/10.1136/vr.j5890.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!