Filters








61 Hits in 4.6 sec

Forward Secure Asynchronous Messaging from Puncturable Encryption

Matthew D. Green, Ian Miers
<span title="">2015</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/inod5dqjxfdj3bnjykkklcg7d4" style="color: black;">2015 IEEE Symposium on Security and Privacy</a> </i> &nbsp;
In this paper we investigate new mechanisms for achieving forward secure encryption in store and forward messaging systems such as email and SMS.  ...  We show how to combine puncturable encryption with the forward-secure public key encryption proposal of Canetti et al. to achieve practical forward-secure messaging with low overhead.  ...  Fig. 3 . 3 Puncturable Forward Secure Encryption from puncturable encryption and Hierarchical Identity Based Encryption.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/sp.2015.26">doi:10.1109/sp.2015.26</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/sp/GreenM15.html">dblp:conf/sp/GreenM15</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/nczd4nd7craifplr6z4usi3hlu">fatcat:nczd4nd7craifplr6z4usi3hlu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180724032355/https://ieeexplore.ieee.org/ielx7/7160813/7163005/07163033.pdf?tp=&amp;arnumber=7163033&amp;isnumber=7163005" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0a/7d/0a7ddb346f432c50476359eb39510c838f739eee.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/sp.2015.26"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

A Modern View on Forward Security

Colin Boyd, Kai Gellert
<span title="2020-08-24">2020</span> <i title="Oxford University Press (OUP)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/bf4qaipmsrghrjyxonrsmqevie" style="color: black;">Computer journal</a> </i> &nbsp;
We survey existing methods for achieving forward security for different cryptographic primitives and propose new definitions and terminology aimed at a unified treatment of the notion.  ...  Forward security ensures that compromise of entities today does not impact the security of cryptographic primitives employed in the past.  ...  Forward secrecy was originally defined by Günther [23] in the context of identity-based cryptography.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1093/comjnl/bxaa104">doi:10.1093/comjnl/bxaa104</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4rmqca3iabh2plsmjif7ai25je">fatcat:4rmqca3iabh2plsmjif7ai25je</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210715054041/https://ntnuopen.ntnu.no/ntnu-xmlui/bitstream/handle/11250/2730309/bxaa104.pdf?sequence=1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d7/3e/d73e6aa61d5030cb7011b2f747c60d00f300e9b9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1093/comjnl/bxaa104"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> oup.com </button> </a>

Fake BTS Attacks of GSM System on Software Radio Platform

Yubo Song, Kan Zhou, Xi Chen
<span title="2012-02-01">2012</span> <i title="Academy Publisher"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/drz46fz5hfbfnerxeguotm7kmy" style="color: black;">Journal of Networks</a> </i> &nbsp;
The third paper, "A Novel Turbo-Based Encryption Scheme Using Dynamic Puncture Mechanism" by Qian Mao and Chuan Qin, proposes a novel encryption method based on Turbo code.  ...  A Review on Cloud Computing Development Sugang Ma 222 229 236 243 249 259 267 275 282 288 300 305 REGULAR PAPERS Real Time Intrusion Prediction based on Optimized Alerts with Hidden Markov Model and Security  ...  For a long while it was an open problem to obtain a secure and efficient identity-based encryption (IBE) scheme.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4304/jnw.7.2.275-281">doi:10.4304/jnw.7.2.275-281</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3ejjimllcvewjeifopbvhl3zmi">fatcat:3ejjimllcvewjeifopbvhl3zmi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171117114839/https://core.ac.uk/download/pdf/25792833.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4304/jnw.7.2.275-281"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

OUP accepted manuscript

<span title="">2018</span> <i title="Oxford University Press (OUP)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/bf4qaipmsrghrjyxonrsmqevie" style="color: black;">Computer journal</a> </i> &nbsp;
Proxy re-encryption (PRE) allows a semi-trusted proxy to transform a ciphertext for Alice into a ciphertext of the same message for Bob.  ...  The traditional security notion of PRE focuses on preventing the proxy with the re-encryption key learning anything about the encrypted messages.  ...  Then Alice generates a re-encryption key for Bob and sends it to the cloud. With the re-encryption key, the cloud could transform the ciphertext for Bob.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1093/comjnl/bxy096">doi:10.1093/comjnl/bxy096</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/uz365fdlvbgkfk7u6dd66ghp5q">fatcat:uz365fdlvbgkfk7u6dd66ghp5q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170716055350/https://eprint.iacr.org/2015/1216.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/66/e9/66e937189f938a43a63939035bc125d910097069.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1093/comjnl/bxy096"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> oup.com </button> </a>

Cloud and Edge Computing-Based Computer Forensics: Challenges and Open Problems

Vijay Prakash, Alex Williams, Lalit Garg, Claudio Savaglio, Seema Bawa
<span title="2021-05-21">2021</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ikdpfme5h5egvnwtvvtjrnntyy" style="color: black;">Electronics</a> </i> &nbsp;
This paper seeks to establish an in-depth understanding of the impact of Cloud and Edge computing-based environmental factors.  ...  Software and hardware tools used in the digital forensic process, forensic methods for handling tampered sound files, hidden files, image files, or images with steganography, etc.  ...  The authors of [108] analyzed cutting-edge techniques for steganography and steganalysis. The authors have identified various areas/applications that can use steganography in real life.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/electronics10111229">doi:10.3390/electronics10111229</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mkutuyvfinhajcmpymcc57zrka">fatcat:mkutuyvfinhajcmpymcc57zrka</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210528235610/https://res.mdpi.com/d_attachment/electronics/electronics-10-01229/article_deploy/electronics-10-01229-v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bb/26/bb269be157d2e5bba50773cb937dccf79dedc487.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/electronics10111229"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

Verifiable Functional Encryption [chapter]

Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai
<span title="">2016</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Our positive results are general and also apply to other simpler settings such as Identity-Based Encryption, Attribute-Based Encryption and Predicate Encryption.  ...  In light of security challenges that have emerged in a world with complex networks and cloud computing, the notion of functional encryption has recently emerged.  ...  We thank Dakshita Khurana and Divya Gupta for collaborating in the initial stages of the project.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-53890-6_19">doi:10.1007/978-3-662-53890-6_19</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jhcex3fxnfdqdntnxhty3t7sui">fatcat:jhcex3fxnfdqdntnxhty3t7sui</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170711034626/http://eprint.iacr.org/2016/629.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1d/25/1d253237c816cbdeefde9e2e55d07a1e4a148aac.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-53890-6_19"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Database Padding for Dynamic Symmetric Searchable Encryption

Ruizhong Du, Yuqing Zhang, Mingyue Li, Qi Jiang
<span title="2021-12-31">2021</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sdme5pnua5auzcsjgqmqefb66m" style="color: black;">Security and Communication Networks</a> </i> &nbsp;
Dynamic symmetric searchable encryption (DSSE) that enables the search and update of encrypted databases outsourced to cloud servers has recently received widespread attention for leakage-abuse attacks  ...  The security analysis and simulation results show that our dynamic padding algorithm is suitable for DSSE scheme and PDB-DSSE scheme maintains the security and efficiency of the retrieval and update of  ...  Setup(1 λ ): this algorithm enters a security parameter λ. It outputs a client's state σ and an encrypted database EDB which is uploaded to the cloud server.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2021/9703969">doi:10.1155/2021/9703969</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7n7elcrumjgebf7ts2h4v723ke">fatcat:7n7elcrumjgebf7ts2h4v723ke</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220206124226/https://downloads.hindawi.com/journals/scn/2021/9703969.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bf/ce/bfcee0abc1a806472e91045789dc99f905b5405d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2021/9703969"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

D2.3 - GDPR-compliant and Privacy-Preserving Analytics for Healthcare Providers

Suite5, SECURA BV, Tampere University
<span title="2020-05-31">2020</span> <i title="Zenodo"> Zenodo </i> &nbsp;
State of the art analysis on Functional Encryption and the provision of a set of GDPR-compliant analytics that can offer analytics services to providers that have access to encrypted data.  ...  The deliverable also reports on investigated and analytics techniques used by CSPs and Healthcare Providers in order to secure their infrastructures against cyber threats.  ...  Any string could serve as an identity, as for example an email address, an IP address, a location and more. IBE can be viewed as functional encryption for the class of equality tests.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.4022329">doi:10.5281/zenodo.4022329</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/sdtc5fkkofc6vigeil25ulhm5u">fatcat:sdtc5fkkofc6vigeil25ulhm5u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200928025003/https://zenodo.org/record/4022330/files/ASCLEPIOS%20D2.3%20-%20GDPR-compliant%20and%20Privacy-Preserving%20Analytics%20for%20Healthcare%20Providers.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2c/8d/2c8d892159f7a085763125406e8a1f8f023be96d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.4022329"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

List of Contributors [chapter]

Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya
<span title="2019-10-21">2019</span> <i title="De Gruyter"> Big Data Security </i> &nbsp;
Ultimately, the cryptographically enforced access control and secure communication solution present as a conclusion are identity and attribute-based encryptions, encrypting techniques supporting search  ...  The encryptions, especially policy-based encryption, and a signature on data safe secure data storage and transaction logs.  ...  The secure coding in a different language may fluctuate; encryption protocols are singular as per requirement.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1515/9783110606058-202">doi:10.1515/9783110606058-202</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3jtqdtgsavas7n3vxrtbrkdbdy">fatcat:3jtqdtgsavas7n3vxrtbrkdbdy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201109084201/https://www.degruyter.com/downloadpdf/title/539861.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/89/1b/891b6ee3e733a2909c8745300ed76d1478ec57b3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1515/9783110606058-202"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> degruyter.com </button> </a>

TRC-PAD: Accelerating Recruitment of AD Clinical Trials through Innovative Information Technology

G.A. Jimenez-Maggiora, S. Bruschi, R. Raman, O. Langford, M. Donohue, M.S. Rafii, R.A. Sperling, J.L. Cummings, P.S. Aisen, And The TRC-PAD Investigators
<span title="">2020</span> <i title="The Journal of Prevention of Alzheimer&#39;s Disease (JPAD)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/5q3gn7lyzna4tac67l56vxddqm" style="color: black;">The journal of prevention of Alzheimer&#39;s disease</a> </i> &nbsp;
Results: The TRC-PAD IP supported growth in recruitment, screening, and enrollment of TRC-PAD participants by leveraging a secure, scalable, cost-effective cloud-based information technology architecture  ...  emission tomography (PET) or lumbar puncture (LP).  ...  Telephonebased support requests were automatically transcribed and forwarded to the email-based support management system for follow-up.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14283/jpad.2020.48">doi:10.14283/jpad.2020.48</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/32920624">pmid:32920624</a> <a target="_blank" rel="external noopener" href="https://pubmed.ncbi.nlm.nih.gov/PMC7769128/">pmcid:PMC7769128</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gwq2gxy6hnbbtidw7xiokfesvq">fatcat:gwq2gxy6hnbbtidw7xiokfesvq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210718035651/https://link.springer.com/content/pdf/10.14283/jpad.2020.48.pdf?error=cookies_not_supported&amp;code=de920221-b0ea-4264-80e9-99a36d82e994" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ce/9f/ce9f3a33d0a077a7aa3d7c0cae4f572b7e6e5292.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14283/jpad.2020.48"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7769128" title="pubmed link"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> pubmed.gov </button> </a>

Adaptive limited feedback for MISO wiretap channels with cooperative jamming

Minyan Pei, Dongtang Ma, Jibo Wei
<span title="">2013</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yyhqnzanmjgq3gg3m5e5vh2noy" style="color: black;">2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)</a> </i> &nbsp;
encryption.  ...  Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry.  ...  WIRELESS SECRET KEY AGREEMENT We recall that the original secure communication system studied by Shannon was based on secret-key encryption.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/spawc.2013.6612057">doi:10.1109/spawc.2013.6612057</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/spawc/PeiMW13.html">dblp:conf/spawc/PeiMW13</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gjn4o2l4qjae5ipsr6zfjo35yu">fatcat:gjn4o2l4qjae5ipsr6zfjo35yu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180127185345/http://newport.eecs.uci.edu:80/~swindle/pubs/j79.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0a/ff/0aff52c8aacb220892aa471b7cb5f345dcb423d7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/spawc.2013.6612057"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Program

<span title="">2019</span> <i title="IEEE"> 2019 29th International Telecommunication Networks and Applications Conference (ITNAC) </i> &nbsp;
For example, with a domain name length of 30, CWE can reduce the encryption time by 10.7% as compared to the shift-key based method. pp. 51-56  ...  This paper proposes character-wise encryption (CWE) method to provide better security against CP attacks (the probability of successful attack is low as 10-33) as compared to the shift-key based method  ...  LTE, 4G, etc) and Email via Ethernet respectively, between the two remote parties using two different devices at each party in order to mitigate security risks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/itnac46935.2019.9077950">doi:10.1109/itnac46935.2019.9077950</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rz5pxmx3cne5bfy5caahpuh7ia">fatcat:rz5pxmx3cne5bfy5caahpuh7ia</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210429103619/https://ieeexplore.ieee.org/ielx7/9068186/9077926/09077950.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1b/7f/1b7fe39540bcdc217187d1d49395b1dede010bad.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/itnac46935.2019.9077950"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Introducing Social Media Intelligence (SOCMINT)

David Omand, Jamie Bartlett, Carl Miller
<span title="">2012</span> <i title="Informa UK Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/qdbicpil45bgxnehlhffqdyuui" style="color: black;">Intelligence and national security</a> </i> &nbsp;
Accessing encrypted BlackBerry messaging by cracking the security PIN is an interception of communications under RIPA 2000 for which a warrant would be required. . Generality.  ...  In a recent example, a leaked cache of emails allegedly belonging to Bashar al-Assad indicated that an aide, Hadeel al-Assad, posted pro-regime commentary under an assumed Facebook identity that was mistaken  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1080/02684527.2012.716965">doi:10.1080/02684527.2012.716965</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4chvwcut75gvhad4fhg7cy5hvu">fatcat:4chvwcut75gvhad4fhg7cy5hvu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180413142049/https://preventviolentextremism.info/sites/default/files/Introducing%20Social%20Media%20Intelligence.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7a/b4/7ab4842df815b4d6cf4395e4aa0659914dc6f3e8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1080/02684527.2012.716965"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> tandfonline.com </button> </a>

Effects of Purified Anthocyanins in People at Risk for Dementia: Study Protocol for a Phase II Randomized Controlled Trial

Khadija Khalifa, Anne Katrine Bergland, Hogne Soennesyn, Ketil Oppedal, Ragnhild Oesterhus, Ingvild Dalen, Alf Inge Larsen, Tormod Fladby, Helen Brooker, Keith A. Wesnes, Clive Ballard, Dag Aarsland
<span title="2020-09-02">2020</span> <i title="Frontiers Media SA"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/4kchoxo3jrfubkck3y7nfncina" style="color: black;">Frontiers in Neurology</a> </i> &nbsp;
Participants are block randomized to identically appearing capsules containing 80 mg of naturally purified anthocyanins or placebo 1:1. Dosage is 2 + 2 capsules per day for 24 weeks.  ...  The change from baseline scores will be subject to a mixed model for repeated measures analysis of covariance.  ...  ACKNOWLEDGMENTS The authors would like to thank the trial participants, the three hospitals (SUS, Ahus, and Betanien Hospital), and all the research staff members at the sites for their ongoing assistance  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3389/fneur.2020.00916">doi:10.3389/fneur.2020.00916</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/32982933">pmid:32982933</a> <a target="_blank" rel="external noopener" href="https://pubmed.ncbi.nlm.nih.gov/PMC7492209/">pmcid:PMC7492209</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/w7ub4akh3ffrljzcs2dc5qay2q">fatcat:w7ub4akh3ffrljzcs2dc5qay2q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200908095250/https://fjfsdata01prod.blob.core.windows.net/articles/files/547389/pubmed-zip/.versions/1/.package-entries/fneur-11-00916/fneur-11-00916.pdf?sv=2015-12-11&amp;sr=b&amp;sig=M7uroF81S%2BgdPC29I3Q5J3m5Q6adbVCBf49XfOtMQ%2BU%3D&amp;se=2020-09-08T09%3A53%3A20Z&amp;sp=r&amp;rscd=attachment%3B%20filename%2A%3DUTF-8%27%27fneur-11-00916.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8f/f7/8ff78f4a4f95b4264d372a04f44b16d30be156a2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3389/fneur.2020.00916"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> frontiersin.org </button> </a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7492209" title="pubmed link"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> pubmed.gov </button> </a>

Cellular, Wide-Area, and Non-Terrestrial IoT: A Survey on 5G Advances and the Road Towards 6G [article]

Mojtaba Vaezi, Amin Azari, Saeed R. Khosravirad, Mahyar Shirvanimoghaddam, M. Mahdi Azari, Danai Chasaki, Petar Popovski
<span title="2021-07-07">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
The IoT will encompass devices that must wirelessly communicate a diverse set of data gathered from the environment for myriad new applications.  ...  The solutions include grant-free access and channel coding for short-packet communications, non-orthogonal multiple access, and on-device intelligence.  ...  As IoT continues to grow, security by design is the only way forward.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2107.03059v1">arXiv:2107.03059v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/i7rxlipsd5eojgpx3x5yxioozq">fatcat:i7rxlipsd5eojgpx3x5yxioozq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210713093533/https://arxiv.org/pdf/2107.03059v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/55/47/55476893ab00a8f5846695673aa11a40e4372408.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2107.03059v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 61 results