Zobrazeno 1 - 10
of 22
pro vyhledávání: '"Mohit Sethi"'
Publikováno v:
MAMC Journal of Medical Sciences, Vol 4, Iss 3, Pp 128-132 (2018)
Introduction Short messaging service (SMS), or text messaging is highly accepted in medical education of health workers and patients. This study was conducted to evaluate if SMS-based supplementation of key messages with conventional classroom teachi
Externí odkaz:
https://doaj.org/article/5d61ca4920074d599d20b826ddf07de0
Autor:
Aleksi Peltonen, Eduardo Inglés, Sampsa Latvala, Dan Garcia-Carrillo, Mohit Sethi, Tuomas Aura
Publikováno v:
Sensors, Vol 20, Iss 21, p 6101 (2020)
The emergence of radio technologies, such as Zigbee, Z-Wave, and Bluetooth Mesh, has transformed simple physical devices into smart objects that can understand and react to their environment. Devices, such as light bulbs, door locks, and window blind
Externí odkaz:
https://doaj.org/article/d2e0de983c174e55aa88be988654377a
Autor:
Mohit Sethi, Tuomas Aura
Secure bootstrapping of Internet of Things (IoT) devices is often a multi-step process that begins with enabling Internet access through a local wireless network. The process of enabling Internet access on IoT devices includes network discovery and s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::66b2f1813bd687e14f008abfa83695f3
https://aaltodoc.aalto.fi/handle/123456789/117784
https://aaltodoc.aalto.fi/handle/123456789/117784
Publikováno v:
SAE Technical Paper Series.
Secure bootstrapping is the process by which a device gets the necessary configuration information and security credentials to become operational. In many pervasive computing and Internet-of-Things scenarios, it is often not possible to rely on the e
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d8e28cb72d7f790f4f85b3b231aba6b3
https://aaltodoc.aalto.fi/handle/123456789/44057
https://aaltodoc.aalto.fi/handle/123456789/44057
Publikováno v:
AsiaCCS
In identity misbinding attacks against authenticated key-exchange protocols, a legitimate but compromised participant manipulates the honest parties so that the victim becomes unknowingly associated with a third party. These attacks are well known, a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::68f15cb351810877a1ef2b77121058ad
Publikováno v:
Computer Science Review. 17:25-42
The TCP/IP architecture of the Internet was originally designed around the contemporary restrictions of large computers that were difficult to move around. However, electronics followed Moore's law, resulting in cheaper and smaller electronics for co
Autor:
Radhey S. Gupta, Mohit Sethi
Publikováno v:
Anaerobe. 28:182-198
The members of the phylum Fusobacteria and its two families, Fusobacteriaceae and Leptotrichiaceae, are distinguished at present mainly on the basis of their branching in the 16S rRNA gene trees and analysis of the internal transcribed spacer sequenc
Autor:
Pankaj N. Desai, Chintan N. Patel, Mayank Kabrawala, Subhash Nanadwani, Rajiv Mehta, Ritesh Prajapati, Nisharg Patel, Mohit Sethia
Publikováno v:
Journal of Digestive Endoscopy, Vol 13, Iss 04, Pp 243-250 (2022)
Endoscopy is an evolving science and the last two decades has seen it expand exponentially at a pace unapparelled in the past. With the advancement in new procedures like image-enhanced endoscopy, magnifying endoscopy, third space endoscopy, and high
Externí odkaz:
https://doaj.org/article/d5acac96f56247fb86509e844a7fb03a
Publikováno v:
PerDis
Pervasive displays are increasingly employing web-based applications served by the cloud to show dynamic content and provide services to end users. In several important use cases, the content shown by one display needs to be replicated at multiple lo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::af33c50d3a98d26b0c8cb360443bcd75
https://doi.org/10.1145/2914920.2915013
https://doi.org/10.1145/2914920.2915013