Identity and access management (IAM) system usually consist of predefined tasks as an information security system. Themain task is the authentication, since it is responsible for user identity ...proving for service providers that corporate with (IAM).This paper provides a review on intelligent authentication research applicable to IAM systems. These researches areevaluated according to the proposal of intelligent authentication key factors. Depending on this evaluation it could not be foundresearch implement an authentication that satisfies all these key factors.
The Auger parameter (AP) is a value extracted from the X‐ray photoelectron spectrum (XPS) by addition of the binding energy of a photoelectron, for a given element in the spectrum, to the kinetic ...energy of the Auger electron emitted as the resulting hole in the electronic structure is filled by an electron from one of the outer orbitals. The value of the AP is sensitive to the polarization of electrons in the orbitals of neighbouring ions towards the photo‐ionized atom and is thus related to other opto‐electronic properties of the material. A correlation had been shown between the refractive index and the AP of aluminosilicates and thus the ability to compare, on a single chart, the AP's of the Al and Si ions gave important structural information. This comparison was made possible by normalising the individual APs to a common zero‐point. In this contribution, the methodology employed is extended to a wider range of elements. The resulting ability, to compare and contrast the normalised AP, thus generated, greatly enhances the information available from XPS and thus relates it directly to the polarizability of the material's structure.
This paper proposes the hardware architecture capable of processing the AES-GCM algorithm in parallel and pipeline. To boost the hardware efficiency, two parallel AES processing units, each ...consisting of a mixed inner- and outer-round pipelining architecture, are employed in the encryption/decryption module. These two AES units share a key expansion unit to save the hardware resource. To optimize the architecture of the AES algorithm, the S-box function is directly realized with the built-in BRAM in the FPGA technique to decrease the number of LUTs used, and implemented with the composite field operation in the ASIC technique in order to save up to 25% logic gates. In the GHASH module design, two pipelining finite field GF<inline-formula> <tex-math notation="LaTeX">(2^{128}) </tex-math></inline-formula> multipliers with appropriate data scheduling are utilized. In addition, realizing the finite field multiplication with the Karatsuba algorithm can further save 50.7% of hardware resource. The resulting AES-GCM IP has been implemented and verified with a Xilinx Virtex 5 series device (XC5VLX220), and a tsmc 0.18-<inline-formula> <tex-math notation="LaTeX">\mu \text{m} </tex-math></inline-formula> cell library. In FPGA verification, the working frequency can achieve 223.314 MHz, yielding the maximum throughputs of 57.17 Gbps. The number of slices/BRAMs used is 5,944/109. The resulting ASIC can operate at 197.239 MHz in simulation and achieve a high throughput of 50.49 Gbps. The core area of the chip is <inline-formula> <tex-math notation="LaTeX">6,552\,\,\mu \text{m}\,\, \times 6,516 \, \mu \text{m} </tex-math></inline-formula>. The power consumption is 1,466.5 mW.
This article described the Advanced Encryption Standard (AES) encryption and decryption process without using lookup tables in the MixColumns transformation and parallelizing the transformation ...process implemented in the Field Programmable Gate Array (FPGA) hardware. Parallelism of the hardware process conducted to the transformation of key schedule, addroundkey, subbyte and shiftrows (subshift) and mixcolumns in the first 5 rounds of the encryption process. The decryption process was parallelized in subshift transformations, both transformations were implemented at the same time. This research produced a modified AES encryption and decryption method and algorithm with the aim of minimizing the resources required for hardware implementation. The method in this article was applied to Xilinx ISE 14.7 software. The experimental results showed that the encryption process required 2,357 slice LUT's, 845 occupied slices and 26 IOB's, while the decryption process required 2,896 LUT's, 1,323 occupied slices and 26 IOB's resources. The encryption and decryption processes each took an average of 2.891 nanoseconds and 3.467 nanoseconds for every 128 bits of data. This approach leads us to obtain a component with minimum resources and enough computational speed.
With the rapid increase in the development of Deep Learning methodologies, Deep Neural Networks (DNNs) are now being commonly deployed in smart systems (e.g. autonomous vehicles) and high-end ...security applications (e.g. face recognition, biometric authentication, etc.). The training of such DNN models often requires exclusive valuable training datasets, enormous computational resources, and expert fine-tuning skills. Hence, a trained DNN model can be regarded as valuable proprietary Intellectual Property (IP). Piracy of such DNN IPs has emerged as a major concern, with increasing trends of illegal copying and redistribution. A number of mitigation approaches targeting DNN IP protection have been proposed in recent years. In this work, we target two recently proposed DNN IP protection schemes: (a) Chaotic Map theory based encryption of the weight parameters, and (b) traditional block cipher based encryption of the weights. We demonstrate attacks on two recent DNN IP protection techniques, with one technique each belonging to the above-mentioned schemes, under a pragmatic attack model. We also propose a novel DNN IP protection technique based on selective encryption of the weight parameters, termed LEWIP to mitigate the exposed weaknesses, while having low implementation and performance overheads. Finally, we demonstrate the effectiveness of the LEWIP technique against state-of-the-art DNN implementations.
•A thicker passive film formed on SLM 316L SS than that of the wrought one in SBF.•The difference in composition of the SLM and wrought 316L SS was revealed.•The pitting corrosion of SLM 316L SS ...initiates at the pores with unmelted metallic balls in SBF.
Recently, the stainless steels produced by selective laser melting (SLM) have received considerable attention in biomedicine, but their corrosion behaviors in the body environment are not revealed clearly up to now. In this study, the fundamental research on influences of microstructures on corrosion behavior of 316L stainless steel (316L SS) produced by SLM was conducted simulated body fluid (SBF). Higher densities of grain boundary, sub-grain boundary and dislocation resulted in a thicker passive film forming on SLM 316L SS comparing with that of wrought sample in SBF. Composition analyses of passive films revealed that the excessive thickness was the outer layer. No sulfide and dislocation tangling around oxide inclusions in SLM 316L SS contributed to a 0.205 V nobler pitting potential of SLM 316L SS than that of the wrought in SBF.
Microwave induced plasma atomic emission spectrometry (MP-AES) was evaluated as a strategy for the analysis of simulated gastrointestinal solutions to estimate the in vitro bioaccessibility of ...essential elements in cooked pink shrimp. Operational conditions such as pump speed, nitrogen flow, and viewing position were thoroughly optimized for each element. Afterwards the validation of the analytical method was performed. Limits of quantification ranged from 0.005 mg kg−1 (Mn) to 0.106 mg kg−1 (Zn). Accuracy was evaluated by using a certified reference material and performing a mass-balance study. Suitable mass balances within the range 95–105% were obtained. In vitro bioaccessibility in cooked shrimp samples ranged from 14.7% (Fe) to 48.1% (Zn), in agreement with previous data from other shrimp species. The proposed procedure proved to be an outstanding sequential analytical strategy for elemental bioaccessibility studies, providing simplicity and high sample throughput compared to conventional approaches. Furthermore, this work constitutes the first work regarding the optimization of an elemental bioaccessibility study on animal protein employing MP-AES.
Display omitted
•The new method for elemental bioaccessibility studies was very efficient and robust.•The thorough optimization of operational conditions for MP-AES determinations was key.•Accuracy was evaluated using a certified reference material and a mass-balance study.•Suitable mass balances within the range 95–105% were obtained after validation.•In vitro bioaccessibility of shrimp samples ranged from 14.7% (iron) to 48.1% (zinc).
This study investigates the impact of powder layer thickness on spatter generation and oxidation behavior during the processing of Hastelloy X. In-situ monitoring using optical tomography reveals ...that thicker powder layers result in a higher number of hot spatters generated during laser-melt-powder interaction. Scanning electron microscopy and Auger electron spectroscopy analysis demonstrate the presence of different types of spatters that oxidize differently depending on their origin. X-ray photoelectron spectroscopy analysis further shows that the surface enrichment of oxide-forming elements such as Al, Ti, Cr, and Fe varies with the type of spatter particle. Additionally, depth profile analysis using X-ray photoelectron spectroscopy indicates that the average oxide layer thickness increases from ∼2.5 nm in virgin to ∼68 nm in spatters generated at 150 μm powder layer thickness. The findings suggest that powder layer thickness is a crucial factor in controlling spatter generation and oxidation behavior during powder bed fusion-laser beam processing.
Display omitted
•The OT analysis showed an increase in the number of spatters signals with the increase in powder layer thickness.•The number of redeposited spatters on the powder bed also increased with the increase in powder layer thickness.•The morphology analysis showed that not all spatters oxidize in a similar fashion.•The chemistry of oxides on the spatter surface varied by the changes in the morphology of the spatters.•Spatters from 150 μm powder layer thickness showed the highest oxide particulate thickness.
With the widespread use of immune checkpoint inhibitors (ICIs), patients inevitably experience immune-related adverse events (irAEs). Therefore, the study was conducted on the clinical ...characteristics and outcomes of patients with non-small cell lung cancer (NSCLC) with immune-related hepatitis (ir-hepatitis).
We identified patients with advanced NSCLC who developed ir-hepatitis after immunotherapy between June 2016 and December 2022. Their irAEs were categorized according to the Common Terminology Criteria for Adverse Events version 4.03 (CTCAE 4.03). Kaplan-Meier curves and log-rank tests were used to analyze survival.
A total of 35 patients were enrolled in the study. The numbers of mild (grade 1-2) and severe (grade 3-4) ir-hepatitis cases were 13 (grade 1, 3; grade 2, 10) and 22 (grade 3, 17; grade 4, 5), respectively. The median onset time of ir-hepatitis was 1.6 months. The median progression-free survival (mPFS) was 8.3 months. PFS differed between patients with early ir-hepatitis developing within two treatment cycles and those with ir-hepatitis developing more than two treatment cycles (5.5
12.7 months, P=0.004). Patients with severe rather than mild ir-hepatitis tended to poorer PFS survival (5.8
11.2 months, P=0.130). The appearance of ir-hepatitis within two treatment cycles (P=0.002) and higher severity grades of ir-hepatitis (P=0.005) were independent risk factors for PFS.
Early and severe ir-hepatitis are associated with worse survival benefits, which still required more basic and perspective studies.