Search results for "Sword"
showing 10 items of 51 documents
Probabilistic risk assessment of the exposure to polybrominated diphenyl ethers via fish and seafood consumption in the Region of Valencia (Spain)
2013
The study was carried out to estimate the dietary intake of polybrominated diphenyl ethers (PBDEs) in the Region of Valencia (Spain) in order to evaluate the resultant risk. The PBDE levels in fish and seafood (a total of 206 samples) were determined. Dietary intake was estimated using results of PBDE analyses in fish and seafood marketed in the Region of Valencia over the period 2007-2012 and data of the first Valencian Food Consumption Survey, conducted in 2010. Two scenarios were assumed for left-censored results: the lower-bound (LB) scenario, in which unquantified results (below the limit of quantification (LOQ)) were set to zero and the upper-bound (UB) scenario, in which unquantified…
Assessment of metal levels in foodstuffs from the Region of Valencia (Spain).
2017
Graphical abstract
Disseminating scientific research: a double-edged sword?
2017
Practitioners rarely have the time or propensity to read scientific research, and scholarly researchers seldom write for non-academic audiences. Nevertheless, both groups would probably agree that researchers could solve many problems faced by practitioners and that research is important to guide practice. This article acknowledges scientists’ failure to communicate successfully with practitioners, and discusses the main differences between academic and practitioner-oriented journals in management and business related disciplines. Author guidelines of the most prominent journals that appeal to both academics and practitioners are reviewed and discussed. A thorough literature review is also …
Morir por espada: Helena, vv. 298-302
2015
En las tragedias de Eurípides algunos personajes reflexionan sobre el mejor modo de suicidarse. Lo hace Helena en la tragedia homónima en varias ocasiones, incluyendo los vv. 298 ss., que han sido atetizados por varios editores. En este estudio apoyamos la autenticidad de esos versos, en los que Helena manifiesta su preferencia por la muerte por espada e indicamos las causas de esa preferencia.
Exposure to mercury among Spanish preschool children: Trend from birth to age four
2013
The purpose of this study is to describe the total hair mercury concentrations and their determinants in preschool Spanish children, as well as to explore the trend in mercury exposure from birth to the age four. This evolution has been scarcely studied in other birth cohort studies. The study population was 580 four year old children participating in the INMA (i.e. Childhood and Environment) birth cohort study in Valencia (2008–2009). Total mercury concentration at age four was measured in hair samples by atomic absorption spectrometry. Fish consumption and other covariates were obtained by questionnaire. Multivariate linear regression models were conducted in order to explore the associat…
SAFEPASS - Presenting a Convenient, Portable and Secure Password Manager
2018
CORMORANT
2019
People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their owners' digital lives, strong authentication is vital to protect sensitive information and services against unauthorized access. However, at least one in three devices is unprotected, with inconvenience of traditional authentication being the paramount reason. We present the concept of CORMORANT, an approach to significantly reduce the manual burden of mobile user verification through risk-aware, multi-modal biometric, cross-device authentication…
Embedded access points for trusted data and resources access in HPC systems
2010
Biometric authentication systems represent a valid alternative to the conventional username-password based approach for user authentication. However, authentication systems composed of a biometric reader, a smartcard reader, and a networked workstation which perform user authentication via software algorithms have been found to be vulnerable in two areas: firstly in their communication channels between readers and workstation (communication attacks) and secondly through their processing algorithms and/or matching results overriding (replay attacks, confidentiality and integrity threats related to the stored information of the networked workstation). In this paper, a full hardware access poi…
Can individuals’ neutralization techniques be overcome? A field experiment on password policy
2020
Individuals’ lack of adherence to password security policy is a persistent problem for organizations. This problem is especially worrisome because passwords remain the primary authentication mechanism for information systems, and the number of passwords has been increasing. For these reasons, determining methods to improve individuals’ adherence to password-security policies constitutes an important issue for organizations. Extant research has shown that individuals use neutralization techniques, i.e., types of rationalizations, to disregard organizational information-security policies. What has not been determined from extant information security research is whether these neutralizations c…
Secure integration of multiprotocol instant messenger
2017
Pidgin communicator is a multiprotocol instant messenger client, developed by open source community. It was originally a third party client of AIM (AOL Instant Messenger) protocol for Linux operating system founded in 1998. At present, its main goal is to provide common interface for every protocol it supports, so the user does not need care about protocol to use or peer's IM identifier, while he just want to talk with a Bob. The work focuses mainly on security and functionality aspects like password storage strategies, integration with plugins which provide privacy of communication. This paper shares experiences has been gained during the process of developing and replacement of existing c…