Skip Content
You are currently on the new version of our website. Access the old version .

546 Results Found

  • Article
  • Open Access
9 Citations
6,201 Views
22 Pages

9 July 2016

Code dissemination in wireless sensor networks (WSNs) is a procedure for distributing a new code image over the air in order to update programs. Due to the fact that WSNs are mostly deployed in unattended and hostile environments, secure code dissemi...

  • Article
  • Open Access
547 Views
12 Pages

Indoor visible light positioning is susceptible to specular interference, which reduces the accuracy of positioning. From the perspective of increasing the number of identity documents (IDs), this paper proposes a light source authentication algorith...

  • Article
  • Open Access
10 Citations
5,667 Views
25 Pages

Robust Biometric Authentication from an Information Theoretic Perspective

  • Andrea Grigorescu,
  • Holger Boche and
  • Rafael F. Schaefer

9 September 2017

Robust biometric authentication is studied from an information theoretic perspective. Compound sources are used to account for uncertainty in the knowledge of the source statistics and are further used to model certain attack classes. It is shown tha...

  • Article
  • Open Access
13 Citations
4,336 Views
26 Pages

27 April 2020

A key characteristic of Smart Cities is the ability to reduce conflicts between different agents coexisting in a dynamic system, such as the interaction between vehicles and pedestrians. This paper presents a system to augment the awareness of vehicl...

  • Article
  • Open Access
5 Citations
2,601 Views
13 Pages

8 April 2025

The present study was undertaken for the first time in India to generate a database of isotopic signatures of authentic Indian honey to verify the regulatory criteria laid down by the Food Safety and Standards Authority of India (FSSAI). In this stud...

  • Article
  • Open Access
22 Citations
5,935 Views
17 Pages

16 May 2019

CAPTCHA authentication has been challenged by recent technology advances in AI. However, many of the AI advances challenging CAPTCHA are either restricted by a limited amount of labeled CAPTCHA data or are constructed in an expensive or complicated w...

  • Article
  • Open Access
43 Citations
7,381 Views
23 Pages

This study investigates the topic of innovation strategies based on tradition in the wake of sustainability, in the agritourism sector, as derived from the phenomenon of multifunctionality in agriculture. The results reveal that the tangible and inta...

  • Feature Paper
  • Review
  • Open Access
124 Citations
14,016 Views
32 Pages

Honey Volatiles as a Fingerprint for Botanical Origin—A Review on their Occurrence on Monofloral Honeys

  • Alexandra M. Machado,
  • Maria Graça Miguel,
  • Miguel Vilas-Boas and
  • Ana Cristina Figueiredo

16 January 2020

Honeys have specific organoleptic characteristics, with nutritional and health benefits, being highly appreciated by consumers, not only in food but also in the pharmaceutical and cosmetic industries. Honey composition varies between regions accordin...

  • Proceeding Paper
  • Open Access
1,030 Views
10 Pages

An End-To-End Solution Towards Authenticated Positioning Utilizing Open-Source FGI-GSRx and FGI-OSNMA

  • Muwahida Liaquat,
  • Mohammad Zahidul H. Bhuiyan,
  • Toni Hammarberg,
  • Saiful Islam,
  • Mika Saajasto and
  • Sanna Kaasalainen

This paper presents an end-to-end solution towards authenticated positioning using only Galileo E1B signal by utilizing the Open Service Navigation Message Authentication (OSNMA). One of the primary objectives of this work is to offer a complete OSNM...

  • Article
  • Open Access
24 Citations
6,385 Views
11 Pages

Application of 13C Quantitative NMR Spectroscopy to Isotopic Analyses for Vanillin Authentication Source

  • Concetta Pironti,
  • Maria Ricciardi,
  • Oriana Motta,
  • Federica Camin,
  • Luana Bontempo and
  • Antonio Proto

30 October 2021

The carbon stable isotope ratio (δ13C) is a valuable chemical parameter in the investigation of the geographic origin, quality, and authenticity of foods. The aim of this study is the evaluation of the feasibility of 13C-NMR (Nuclear Magnetic Resonan...

  • Perspective
  • Open Access
14 Citations
6,483 Views
14 Pages

29 September 2017

The smart grid is a promising electrical grid paradigm for enhancing flexibility and reliability in power transmission through two-way communications among grid entities. In the smart grid system, the privacy of usage information measured by individu...

  • Article
  • Open Access
17 Citations
6,223 Views
34 Pages

27 April 2021

This year, 40 years have passed since the adoption of the basic document for the protection of historic gardens, i.e., the Florence Charter. During this time, its recommendations have been verified by both conservation and researchers’ actions, who i...

  • Article
  • Open Access
447 Views
12 Pages

19 November 2025

Accurate species identification is essential for the quality control and standardization of herbal medicines. Agrimonia species, the authentic sources of Agrimoniae Herba, have long been used in traditional medicine, yet limited genomic resources hav...

  • Review
  • Open Access
8 Citations
5,999 Views
50 Pages

24 January 2024

This comprehensive review is devoted to an under-exploited family of phenolic compounds, the coumarins, and the most relevant strands in which they are involved in some spirit beverages—wine spirit, brandy, whiskey, sugar-cane spirits (rum and...

  • Article
  • Open Access
2 Citations
7,290 Views
23 Pages

Influencer marketing is estimated to reach USD 32.55 billion by the year 2025. The extant research on virtual vs. human influencers’ effectiveness has reported mixed results. Currently, research has yet to explore how consumption motivation and...

  • Article
  • Open Access
28 Citations
4,548 Views
18 Pages

17 March 2017

Wireless sensor networks are deployed to monitor the surrounding physical environments and they also act as the physical environments of parasitic sensor networks, whose purpose is analyzing the contextual privacy and obtaining valuable information f...

  • Feature Paper
  • Article
  • Open Access
5 Citations
8,376 Views
29 Pages

We consider an authentication process that makes use of biometric data or the output of a physical unclonable function (PUF), respectively, from an information theoretical point of view. We analyse different definitions of achievability for the authe...

  • Article
  • Open Access
3 Citations
2,784 Views
34 Pages

FIDO2 Facing Kleptographic Threats By-Design

  • Mirosław Kutyłowski,
  • Anna Lauks-Dutka,
  • Przemysław Kubiak and
  • Marcin Zawada

5 December 2024

We analyze the popular in practice FIDO2 authentication scheme from the point of view of kleptographic threats that have not been addressed so far in the literature. We show that despite its spartan design and apparent efforts to make it immune to di...

  • Article
  • Open Access
5 Citations
5,320 Views
12 Pages

Authentication of Fennel, Star Anise, and Anise Essential Oils by Gas Chromatography (GC/MS) and Stable Isotope Ratio (GC/IRMS) Analyses

  • Brett J. Murphy,
  • Tyler M. Wilson,
  • Emma A. Ziebarth,
  • Christopher R. Bowerbank and
  • Richard E. Carlson

12 January 2024

The aromatic compound (E)-anethol is widely used in the flavor, fragrance, and medicinal industries. This compound is commonly produced through steam distillation of fennel, star anise, and anise seed. Given the cost of production, these natural and...

  • Article
  • Open Access
4 Citations
2,909 Views
18 Pages

16 September 2021

The multi-source data collected by the power Internet of Things (IoT) provide the data foundation for the power big data analysis. Due to the limited computational capability and large amount of data collection terminals in power IoT, the traditional...

  • Article
  • Open Access
23 Citations
6,906 Views
15 Pages

How to achieve secure content distribution and accountability in information-centric networking (ICN) is a crucial problem. Subscribers need to verify whether the data came from a reliable source, rather than from a spoofing adversary. Public key cry...

  • Article
  • Open Access
907 Views
28 Pages

A Blockchain-Based Framework for OSINT Evidence Collection and Identification

  • Han-Wen Huang,
  • Chih-Hung Shih,
  • Chen-Yu Li and
  • Hao-Yung Teng

30 November 2025

The rapid advancement of social media and the exponential increase in online information have made open-source intelligence an essential component of modern criminal investigations. However, existing digital forensics standards mainly focus on eviden...

  • Article
  • Open Access
3 Citations
2,569 Views
13 Pages

Area-Efficient Post-Processing Circuits for Physically Unclonable Function with 2-Mpixel CMOS Image Sensor

  • Shunsuke Okura,
  • Masanori Aoki,
  • Tatsuya Oyama,
  • Masayoshi Shirahata,
  • Takeshi Fujino,
  • Kenichiro Ishikawa and
  • Isao Takayanagi

10 September 2021

In order to realize image information security starting from the data source, challenge–response (CR) device authentication, based on a Physically Unclonable Function (PUF) with a 2 Mpixel CMOS image sensor (CIS), is studied, in which variation of th...

  • Article
  • Open Access
3,027 Views
16 Pages

In recent years, non-fiction journalism, regarded as a subset of literary and narrative journalism, has garnered significant attention in Chinese media. This trend underscores a notable departure from traditional journalistic norms of objectivity tow...

  • Article
  • Open Access
297 Views
27 Pages

16 December 2025

As smart education evolves, there is an increasing need for the cloud-centric management and sharing of student exercise physiological data gathered through wearable devices in the physical education domain. However, challenges arise in achieving aut...

  • Article
  • Open Access
2 Citations
7,814 Views
13 Pages

User and Machine Authentication and Authorization Infrastructure for Distributed Wireless Sensor Network Testbeds

  • Markus Anwander,
  • Torsten Braun,
  • Philipp Hurni,
  • Thomas Staub and
  • Gerald Wagenknecht

The intention of an authentication and authorization infrastructure (AAI) is to simplify and unify access to different web resources. With a single login, a user can access web applications at multiple organizations. The Shibboleth authentication and...

  • Article
  • Open Access
25 Citations
4,711 Views
16 Pages

2 August 2018

Accurate detection and differentiation of adulterants in food ingredients and herbal medicines are crucial for the safety and basic quality control of these products. Ophiocordyceps sinensis is described as the only fungal source for the authentic me...

  • Article
  • Open Access
4 Citations
2,080 Views
16 Pages

28 February 2023

To increase the usage of renewable energy, it is vital to maximize local energy production by properly combining various renewable-energy sources by collecting their data and storing it on the cloud. The energy optimization utility, which is used for...

  • Article
  • Open Access
9 Citations
3,816 Views
17 Pages

Authenticated Timing Protocol Based on Galileo ACAS

  • Francesco Ardizzon,
  • Laura Crosara,
  • Nicola Laurenti,
  • Stefano Tomasin and
  • Nicola Montini

21 August 2022

Global navigation satellite systems (GNSSs) provide accurate positioning and timing services in a large gamut of sectors, including financial institutions, Industry 4.0, and Internet of things (IoT). Any industrial system involving multiple devices i...

  • Article
  • Open Access
1 Citations
734 Views
14 Pages

Botanical Authenticity of Miraruira Sold in the Amazonas State, Brazil, Based on Chemical Profiling Using DI-MS and Chemometric Analyses

  • Shelson M. da R. Braga,
  • Felipe M. A. da Silva,
  • Giovana A. Bataglion,
  • Marcia G. A. de Almeida,
  • Larissa O. de Souza,
  • Rebeca dos S. França,
  • Cesar A. S. de Souza,
  • Francinaldo A. da Silva-Filho,
  • Afonso D. L. de Souza and
  • Maria L. B. Pinheiro
  • + 1 author

1 July 2025

Miraruira is a medicinal plant-based product (MPBP) that is widely used in the state of Amazonas for the treatment of diabetes, though its botanical identity remains unclear, which raises concerns about authenticity and therapeutic consistency. One s...

  • Article
  • Open Access
1 Citations
974 Views
21 Pages

GLM-Based Fake Cybersecurity Threat Intelligence Detection Models and Algorithms

  • Junhao Qian,
  • Xuyang Zhang,
  • Shunhang Cheng and
  • Zhihua Li

6 October 2025

Deepfakes, a form of artificial intelligence-generated content, represent a primary method for creating fake cybersecurity threat intelligence (CTI) and are a key source for data poisoning attacks. To effectively assess the authenticity of the cybers...

  • Article
  • Open Access
13 Citations
6,058 Views
24 Pages

Provisioning, Authentication and Secure Communications for IoT Devices on FIWARE

  • Patrícia R. Sousa,
  • Luís Magalhães,
  • João S. Resende,
  • Rolando Martins and
  • Luís Antunes

2 September 2021

The increasing pervasiveness of the Internet of Things is resulting in a steady increase of cyberattacks in all of its facets. One of the most predominant attack vectors is related to its identity management, as it grants the ability to impersonate a...

  • Article
  • Open Access
36 Citations
7,065 Views
29 Pages

7 December 2018

With the successful proliferation of data outsourcing services, security and privacy issues have drawn significant attention. Data authentication in particular plays an essential role in the storage of outsourced digital content and keeping it safe f...

  • Article
  • Open Access
23 Citations
6,227 Views
16 Pages

24 February 2018

With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted s...

  • Article
  • Open Access
291 Views
25 Pages

Authentication and Authorisation Method for a Cloud Side Static IoT Application

  • Jose Alvarez,
  • Matheus Santos,
  • David May and
  • Gerard Dooly

19 December 2025

IoT applications are increasingly common, yet they often rely on expensive, externally managed authentication services. This paper introduces a novel, self-contained authentication method for IoT applications which leverages fog computing principles...

  • Article
  • Open Access
764 Views
30 Pages

23 October 2025

The proliferation of counterfeit products poses a substantial threat to numerous industries. Blockchain technology (BCT) offers an effective solution for product traceability, providing a means to combat counterfeiting. However, BCT can verify the au...

  • Article
  • Open Access
33 Citations
3,956 Views
22 Pages

24 January 2023

Wireless Sensor Networks—WSNs, an important part of IoT—consist of sensor nodes with limited processing, memory capacities, and energy. Wireless Sensor Networks face many dangers as they are often distributed into untrusted regions. The a...

  • Article
  • Open Access
2 Citations
2,427 Views
18 Pages

After the end of IPv4 addresses, the Internet is moving towards IPv6 address architecture quickly with the support of virtualization techniques worldwide. IPv4 and IPv6 protocols will co-exist long during the changeover process. Some attacks, such as...

  • Article
  • Open Access
8 Citations
12,802 Views
13 Pages

Chemical Composition, Market Survey, and Safety Assessment of Blue Lotus (Nymphaea caerulea Savigny) Extracts

  • Noura S. Dosoky,
  • Sara A. Shah,
  • Joseph T. Dawson,
  • Sushant Sharma Banjara,
  • Ambika Poudel,
  • Cécile Bascoul and
  • Prabodh Satyal

10 October 2023

Blue lotus, also known as Nymphaea caerulea (Nymphaeaceae), is a water lily found globally in lakes and rivers. With its long history of use in Egyptian culture, blue lotus has been associated with spiritual rituals and health benefits. Nowadays, blu...

  • Review
  • Open Access
1 Citations
3,012 Views
20 Pages

Unmasking the True Self on Social Networking Sites

  • Olga Gavriilidou and
  • Stefanos Gritzalis

Social Networking Sites (SNSs) have redefined the dynamics of self-disclosure, enabling users to share personal information in curated and highly visible ways. Existing research often frames this practice through the “privacy paradox,” ye...

  • Article
  • Open Access
2 Citations
10,428 Views
16 Pages

4 December 2008

This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by d...

  • Article
  • Open Access
23 Citations
3,959 Views
11 Pages

19 March 2021

Isotopic ratios of δ13CVPDB and δ18OVSMOW have been used as an additional parameter to ensure the authenticity of the aging time of 100% agave tequila. For this purpose, 120 samples were isotopically analyzed (40 silver class, 40 aged class, and 40 e...

  • Article
  • Open Access
1 Citations
5,139 Views
11 Pages

The Nigerian media have, over the years, moved back and forth via all manners of experience of leadership, from military to democratic, until they finally settled into the present democratic governance. Experience from previous regimes exposed them t...

  • Article
  • Open Access
13 Citations
5,355 Views
16 Pages

Fostering Workplace Innovation through CSR and Authentic Leadership: Evidence from SME Sector

  • Wei Gao,
  • Lin Wang,
  • Jingdong Yan,
  • Yanxiong Wu and
  • Sadik Yusuf Musse

12 May 2021

The cut-throat situation of competitiveness in almost every business sector, followed by globalization, shortened product life cycles, and rapid technological changes have raised the importance of innovation to overrun the rivals. Scholars have estab...

  • Article
  • Open Access
97 Citations
8,009 Views
16 Pages

18 May 2019

Edge computing provides a unified platform for computing, networking, and storage resources, enabling data to be processed in a timely and efficient manner near the source. Thus, it has become the basic platform for industrial Internet of things (IIo...

  • Article
  • Open Access
11 Citations
3,607 Views
14 Pages

6 March 2023

The development of food tourism, with an emphasis on authentic gastronomy, is important to ensure the long-term sustainability of tourism, especially in rural areas. Success in developing this type of tourism is largely dependent on strong stakeholde...

  • Article
  • Open Access
2,528 Views
18 Pages

Controller Area Network (CAN) Bus Transceiver with Authentication Support and Enhanced Rail Converters

  • Can Hong,
  • Weizhong Chen,
  • Xianshan Wen,
  • Theodore W. Manikas,
  • Ping Gui and
  • Mitchell A. Thornton

4 November 2024

This paper presents an advanced Controller Area Network (CAN) bus transceiver designed to enhance security using frame-level authentication with the concept of a nonphysical virtual auxiliary data channel. We describe the newly conceived transceiver...

  • Article
  • Open Access
2,101 Views
14 Pages

10 December 2024

Authenticating poppy seed oil is essential to ensure product quality and prevent economic and health-related fraud. This study developed a non-targeted approach using FT-IR spectroscopy and pattern recognition analysis to verify the authenticity of p...

  • Article
  • Open Access
5 Citations
3,781 Views
21 Pages

15 April 2020

Resource constraints have prevented comprehensive cryptography and multifactor authentication in numerous Internet of Things (IoT) connectivity scenarios. Existing IoT systems generally adopt lightweight security protocols that lead to compromise and...

  • Article
  • Open Access
1 Citations
3,169 Views
11 Pages

Non-Contact Heart Rate Detection Based on Hand Vein Transillumination Imaging

  • Shuqiang Yang,
  • Deqiang Cheng,
  • Jun Wang,
  • Huafeng Qin and
  • Yike Liu

13 September 2021

Vein recognition technology identifies human vein characteristics under near-infrared light and compares it with stored vein information for personal identification. Although this has high anti-counterfeiting performance, it is possible to fabricate...

of 11