Zobrazeno 1 - 10
of 12
pro vyhledávání: '"John Solis"'
Autor:
Kworweinski Lafontant, Jacob Broeckel, Kara Phillips, Yasamian Alsayed, Wayne A. Ayers-Creech, Yuto Ohigashi, John Solis, Cassidy Bale, Arielle Parks, Scott Dankel, Bill I. Campbell
Publikováno v:
Nutraceuticals, Vol 4, Iss 1, Pp 82-93 (2024)
There has been a rise in popularity of “stimulant-free” or caffeine-free fat loss supplements, but it is not well understood whether those fat loss supplements are effective at enhancing thermogenesis without caffeine’s influence. The purpose o
Externí odkaz:
https://doaj.org/article/4c94c749c41c42a893ae9659a65d1310
Publikováno v:
593 Digital Publisher CEIT. 7:11-23
Se realizó un estudio en la provincia de El Oro donde se calculó la probabilidad de que un usuario de una entidad financiera con determinadas condiciones sociodemográficas utilice o no pagos electrónicos, para su uso en empresas FinTech. El model
Publikováno v:
Computer Communications. 33:2-10
Delay-tolerant networks (DTNs) are characterized by low connectivity and/or unreliable links. Messages are delivered by intermediaries who donate their resources to the system. If these resources are not managed they can be abused by resource hogs, i
Publikováno v:
International Journal of Information Security. 8:61-75
Digital certificates signed by trusted certification authorities (CAs) are used for multiple purposes, most commonly for secure binding of public keys to names and other attributes of their owners. Although a certificate usually includes an expiratio
Publikováno v:
IPCCC
A “best-effort” authentication method, which is easier to attack than generic authentication methods (but requires fewer computations for benign nodes), may be sufficient for certain networking scenarios. We illustrate this point by examining the
Publikováno v:
ACM Conference on Computer and Communications Security
Physical Unclonable Functions (PUFs) are physical systems whose responses to input stimuli (i.e., challenges) are easy to measure but difficult to clone. The unclonability property is due to the accepted hardness of replicating the multitude of uncon
Publikováno v:
COMPSAC (1)
Delay- and disruption-tolerant networks (DTNs) can bring much-needed connectivity to rural areas and other settings with limited or non-existing infrastructures. High node mobility and infrequent connectivity inherent to DTNs make it challenging to i
Publikováno v:
ICDCS
Secure pairing of electronic devices that lack any previous association is a challenging problem which has been considered in many contexts and in various flavors. In this paper, we investigate the use of audio for human-assisted authentication of pr
Autor:
John Solis, Gene Tsudik
Publikováno v:
Privacy Enhancing Technologies ISBN: 9783540687900
Privacy Enhancing Technologies
Privacy Enhancing Technologies
Digital certificates signed by trusted certification authorities (CAs) are used for multiple purposes, most commonly for secure binding of public keys to names and other attributes of their owners. Although a certificate usually includes an expiratio
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2aeab4ce347a05d25c472eaeb04a182e
https://doi.org/10.1007/11957454_20
https://doi.org/10.1007/11957454_20