Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (922)

Search Parameters:
Keywords = authenticity control

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
34 pages, 329 KiB  
Article
The Mater Dolorosa: Spanish Diva Lola Flores as Spokesperson for Francoist Oppressive Ideology
by Irene Mizrahi
Literature 2025, 5(2), 8; https://doi.org/10.3390/literature5020008 - 11 Apr 2025
Viewed by 57
Abstract
This article critically examines the star persona of Lola Flores, an iconic Spanish flamenco artist, within the historical and political context of Francoist Spain (1939–1975). It argues that Flores’s carefully constructed star image not only persisted into post-Franco Spain but also served as [...] Read more.
This article critically examines the star persona of Lola Flores, an iconic Spanish flamenco artist, within the historical and political context of Francoist Spain (1939–1975). It argues that Flores’s carefully constructed star image not only persisted into post-Franco Spain but also served as a covert vehicle for the continued propagation of National-Falangist Catholic ideology. The article primarily focuses on two major productions: the book Lola en carne viva. Memorias de Lola Flores (1990) and the television series El coraje de vivir (1994). Both portray a linear and cohesive version of her life from childhood to her later years, carefully curated to defend and rehabilitate her image. While many view Flores as a self-made artist, the article argues that her star persona was a deliberate construct—shaped by Suevia Films, a major Francoist-era film studio, and media narratives that aligned her with traditional gender roles, Catholic values, and Spanish nationalism. Despite emerging in post-Franco Spain, Flores’s narrative does not mark a rupture from the ideological frameworks of the past. Instead, it repackages Francoist values—particularly those surrounding patriarchal gender norms, suffering, and the glorification of sacrifice—to ensure her continued relevance. Suevia Films (1951) played a significant role in shaping her star persona as a symbol of Spanish folklore, aligning her with Francoist ideals of nation, Catholic morality, and submissive femininity. Her image was used to promote Spain internationally as a welcoming and culturally rich destination. Her persona fit within Franco’s broader strategy of using flamenco and folklore to attract foreign tourism while maintaining tight ideological control over entertainment. Flores’s life is framed as a rags-to-riches story, which reinforces Social Spencerist ideology (a social Darwinist perspective) that hard work and endurance lead to success, rather than acknowledging systemic oppression under Francoism. Her personal struggles—poverty, romantic disappointments, accusations of collaboration with the Franco regime, and tax evasion—are framed as necessary trials that strengthen her character. This aligns with the Catholic ideal of redemptive suffering, reinforcing her status as the mater dolorosa (Sorrowful Mother) figure. This article highlights the contradictions in Flores’s gender performance—while she embodied passion and sensuality in flamenco, her offstage identity conformed to the submissive, self-sacrificing woman idealized by the Francoist Sección Femenina (SF). Even in her personal life, Flores’s narrative aligns with Francoist values—her father’s bar, La Fe de Pedro Flores, symbolizes the fusion of religion, nationalism, and traditional masculinity. Tico Medina plays a key role by framing Lola en carne viva as an “authentic” and unfiltered account. His portrayal is highly constructed, acting as her “defense lawyer” to counter criticisms. Flores’s autobiography is monologic—it suppresses alternative perspectives, ensuring that her version of events remains dominant and unquestioned. Rather than acknowledging structural oppression, the narrative glorifies suffering as a path to resilience, aligning with both Catholic doctrine and Francoist propaganda. The article ultimately deconstructs Lola Flores’s autobiographical myth, demonstrating that her public persona—both onstage and offstage—was a strategic construction that perpetuated Francoist ideals well beyond the dictatorship. While her image has been celebrated as a symbol of Spanish cultural identity, it also functioned as a tool for maintaining patriarchal and nationalist ideologies under the guise of entertainment. Full article
(This article belongs to the Special Issue Memory and Women’s Studies: Between Trauma and Positivity)
34 pages, 8526 KiB  
Article
Zero-Trust Mechanisms for Securing Distributed Edge and Fog Computing in 6G Networks
by Abdulrahman K. Alnaim and Ahmed M. Alwakeel
Mathematics 2025, 13(8), 1239; https://doi.org/10.3390/math13081239 - 9 Apr 2025
Viewed by 80
Abstract
The rapid advancement in 6G networks, driven by the proliferation of distributed edge and fog computing, has introduced unprecedented challenges in securing these decentralized architectures. Traditional security paradigms are inadequate for protecting the dynamic and heterogeneous environments of 6G-enabled systems. In this context, [...] Read more.
The rapid advancement in 6G networks, driven by the proliferation of distributed edge and fog computing, has introduced unprecedented challenges in securing these decentralized architectures. Traditional security paradigms are inadequate for protecting the dynamic and heterogeneous environments of 6G-enabled systems. In this context, we propose ZTF-6G (Zero-Trust Framework for 6G Networks), a novel model that integrates Zero-Trust principles to secure distributed edge and fog computing environments. Robust security is ensured by ZTF-6G by adopting a “never trust, always verify” approach, which comprises adaptive authentication, continuous verification, and fine-grained access control against all entities within the network. Within this context, our proposed framework makes use of Zero-Trust-based multi-layering that extends to AI-driven anomaly detection and blockchain-based identity management for the authentication and real-time monitoring of network interactions. Simulation results indicate that ZTF-6G is able to reduce latency by 77.6% (up to 2.8 ms, compared to the standard models’ 12.5 ms), improve throughput by 70%, and improve resource utilization by 41.5% (90% of utilization). Additionally, the trust score accuracy increased from 95% to 98%, energy efficiency improved by 22.2% (from 88% to 110% efficiency), and threat detection accuracy increased to 98%. Finally, the framework perfectly mitigated the insider threats by 85% and enforced a dynamic policy within 1.8 ms. ZTF-6G maintained a low latency while providing more resilience to insider threats, unauthorized access, and data breaches, which is a requirement of 6G networks. This research aims to lay a foundation for deploying Zero-Trust as an integral part of the next-generation networks which will face the security challenges of the distributed systems driven by 6G networks. Full article
(This article belongs to the Special Issue Advanced Computational Intelligence in Cloud/Edge Computing)
Show Figures

Figure 1

43 pages, 13439 KiB  
Review
FC-BENTEN: Synchrotron X-Ray Experimental Database for Polymer-Electrolyte Fuel-Cell Material Analysis
by Takahiro Matsumoto, Shigeru Yokota, Takuma Kaneko, Mayeesha Marium, Jeheon Kim, Yasuhiro Watanabe, Hiroyuki Iwamoto, Keiji Umetani, Tomoya Uruga, Albert Mufundirwa, Yuki Mizuno, Daiki Fujioka, Tetsuya Miyazawa, Hirokazu Tsuji, Yoshiharu Uchimoto, Masashi Matsumoto, Hideto Imai and Yoshiharu Sakurai
Appl. Sci. 2025, 15(7), 3931; https://doi.org/10.3390/app15073931 - 3 Apr 2025
Viewed by 150
Abstract
This review is focused on FC-BENTEN, an advanced synchrotron X-ray experimental database developed at SPring-8 with support from Japan’s New Energy and Industrial Technology Development Organization (NEDO). Designed to advance polymer electrolyte fuel cells (PEFCs) research, FC-BENTEN addresses challenges in improving efficiency, durability, [...] Read more.
This review is focused on FC-BENTEN, an advanced synchrotron X-ray experimental database developed at SPring-8 with support from Japan’s New Energy and Industrial Technology Development Organization (NEDO). Designed to advance polymer electrolyte fuel cells (PEFCs) research, FC-BENTEN addresses challenges in improving efficiency, durability, and cost-effectiveness through data-driven approaches informed by materials informatics (MI). Through standardization of protocols for sample preparation, data acquisition, analysis, and formatting, the database ensures high-quality, reproducible data essential for reliable scientific outcomes. FC-BENTEN streamlines metadata creation using automated processes and template-based tools, enhancing data management, accessibility, and interoperability. Security measures include two-factor authentication, safeguarding sensitive information and maintaining controlled user access. Planned integration with MI platforms will broaden data cross-referencing capabilities, facilitate PEFC applications expansion, and guide future research. This review discusses FC-BENTEN’s architectural framework, metadata standardization efforts, and role in advancing PEFC research through a high-throughput experimental workflow. It illustrates how data-driven methods and standardized practices contribute to innovation, underscoring databases’ potential to accelerate next-generation PEFC technologies development. Full article
(This article belongs to the Special Issue X-ray Scattering Characterization in Materials Science)
Show Figures

Graphical abstract

20 pages, 1563 KiB  
Article
Chemistry of Mezcal: Volatile Profile of Artisanal Mezcal Made from Wild Agaves of Oaxaca
by Rosa Elvira Sánchez-Fernández, Artemio Pérez-López, Anabel Morales-Solis, Yesenia Manilla-Tellez, Erika Daniela Reyes-Carmona and Graciela Avila-Uribe
Foods 2025, 14(7), 1222; https://doi.org/10.3390/foods14071222 - 31 Mar 2025
Viewed by 349
Abstract
Mezcal is a distilled beverage with a complex chemical profile defined by volatile organic compounds and physicochemical properties that determine its sensory attrib-utes. This study analyzed nine artisanal mezcals produced from four wild agave species in Oaxaca using solid-phase microextraction (SPME) and gas [...] Read more.
Mezcal is a distilled beverage with a complex chemical profile defined by volatile organic compounds and physicochemical properties that determine its sensory attrib-utes. This study analyzed nine artisanal mezcals produced from four wild agave species in Oaxaca using solid-phase microextraction (SPME) and gas chromatography–mass spectrometry (GC-MS) to identify key volatile compounds for traceability and quality control. A total of 82 volatile compounds were identified, with esters, terpenes, and higher alcohols being the most abundant. Eight key compounds, including ethyl acetate, acetic acid, 1-butanol, furfural, methanol, and 2-methyl-1-propanol, were quantified due to their significant impact on mezcal’s quality and authenticity. Additionally, 1,2,3-trimethyl-benzene, nerolidol, and terpinolene were identified as exclusive compounds for differentiating mezcal by agave species and storage duration. The findings highlight the influence of fermentation, distillation, and storage conditions on mezcal’s chemical profile and demonstrate the importance of standardized analytical methods for product authentication. Proper management of variables during fermentation and optimization of the final distillation cuts is necessary to fully comply with regulatory parameters and ensure product quality. By establishing a catalog of compounds that characterize the mezcals, this study provides a scientific basis for improving quality control, ensuring regulatory compliance, and enhancing the traceability of mezcal in high-value markets. The next step is to validate the key volatile compounds with a larger sample and evaluate their reproducibility under different production and storage conditions. Full article
(This article belongs to the Section Drinks and Liquid Nutrition)
Show Figures

Graphical abstract

29 pages, 1199 KiB  
Review
Exhaustive Analytical Profiling of Phytocompounds in Botanical Active Ingredients: Fighting the Global Prevalence of Adulterated Botanical Ingredients for Cosmetics
by Jean-Marie Botto, Loïc Loffredo, Gopinathan K. Menon, Pierre Champy and Francis Hadji-Minaglou
Cosmetics 2025, 12(2), 63; https://doi.org/10.3390/cosmetics12020063 - 31 Mar 2025
Viewed by 762
Abstract
Traditional herbal medicine, ethnopharmacology, and evidence-based phytotherapy inspire the development of botanical active ingredients for cosmetics. Ensuring their authenticity and quality is essential in guaranteeing the safety and efficacy of cosmetic formulations. However, the industry faces challenges related to adulteration and inconsistent verification [...] Read more.
Traditional herbal medicine, ethnopharmacology, and evidence-based phytotherapy inspire the development of botanical active ingredients for cosmetics. Ensuring their authenticity and quality is essential in guaranteeing the safety and efficacy of cosmetic formulations. However, the industry faces challenges related to adulteration and inconsistent verification practices. Adulteration can occur at both the crude raw material stage and during processing, involving misidentification, contamination, or the addition of unauthorized substances. This review emphasizes the need for robust authentication methods, including botanical identification, genetic testing, and phytochemical/metabolomic profiling. Analytical tools such as UV/VIS spectroscopy, HPTLC, GC-MS, HPLC/UHPLC, and isotope analysis provide complementary data for detecting and addressing adulteration. Adulteration jeopardizes product safety, efficacy, regulatory compliance, and consumer trust, while dilutions or substitutions erode the intended health benefits. A standardized, comprehensive approach across the supply chain—from raw material sourcing to extract manufacturing—is critical for maintaining the integrity of botanical ingredients. Cosmetovigilance and nutrivigilance are crucial aspects of ensuring product safety and compliance. This review presents a novel perspective by highlighting that, while the pharmaceutical and nutraceutical industries have long recognized the risks of botanical adulteration, awareness in the cosmetics industry remains limited. It further integrates recent advancements in metabolomic profiling, global regulatory challenges, and the economic implications of botanical adulteration in cosmetics. Future developments in AI-driven authentication technologies may represent a promising solution for addressing evolving challenges in product safety and traceability. Full article
(This article belongs to the Section Cosmetic Formulations)
Show Figures

Figure 1

11 pages, 2648 KiB  
Article
Identification of Marker Peptides in Gelatins from Sika Deer (Cervus nippon) Using Ultra-High-Performance Liquid Chromatography–Quadrupole-Exactive-Orbitrap Mass Spectrometry
by Kouharu Otsuki, Aya Nomizo, Mi Zhang, Dongxia Li, Takashi Kikuchi and Wei Li
Molecules 2025, 30(7), 1528; https://doi.org/10.3390/molecules30071528 - 29 Mar 2025
Viewed by 153
Abstract
Gelatin from deer has garnered attention as a high-value health-promoting resource given its history of usage as a traditional Chinese medicine and recent studies demonstrating its biological activities. Mass spectrometry-based methods have increasingly been employed for species identification in collagen-based materials, effectively addressing [...] Read more.
Gelatin from deer has garnered attention as a high-value health-promoting resource given its history of usage as a traditional Chinese medicine and recent studies demonstrating its biological activities. Mass spectrometry-based methods have increasingly been employed for species identification in collagen-based materials, effectively addressing challenges in quality control and authenticity verification. This study aims to identify characteristic marker peptides in gelatins from sika deer (Cervus nippon) to support their effective use as a health-promoting resource. Gelatin samples were enzymatically digested, and the resulting peptide mixtures were analyzed using ultra-high-performance liquid chromatography coupled with quadrupole Q-Exactive-Orbitrap mass spectrometry (UHPLC-Q-Exactive-Orbitrap MS). Marker peptide candidates were selected based on their high detection intensity and a literature review. Among the 28 selected marker peptide candidates, four peptides (P11, R2, R3, and R4) were defined as characteristic of sika deer gelatin. Comparative analyses with gelatins derived from donkey hide, bovine, porcine, and fish samples further confirmed the specificity of these peptides. These findings establish a robust analytical method for verifying the authenticity of sika deer gelatin, contributing to its safe and effective use as a health-promoting resource. Full article
Show Figures

Figure 1

26 pages, 9418 KiB  
Article
Angle-Controllable SAR Image Generation for Target Recognition with Few Samples
by Xilin Wang, Bingwei Hui, Wei Wang, Pengcheng Guo, Lei Ding and Huangxing Lin
Remote Sens. 2025, 17(7), 1206; https://doi.org/10.3390/rs17071206 - 28 Mar 2025
Viewed by 82
Abstract
The availability of high-quality and ample synthetic aperture radar (SAR) image datasets is crucial for understanding and recognizing target characteristics. However, in practical applications, the limited availability of SAR target images significantly impedes the advancement of SAR interpretation methodologies. In this study, we [...] Read more.
The availability of high-quality and ample synthetic aperture radar (SAR) image datasets is crucial for understanding and recognizing target characteristics. However, in practical applications, the limited availability of SAR target images significantly impedes the advancement of SAR interpretation methodologies. In this study, we introduce a Generative Adversarial Network (GAN)-based approach designed to manipulate the target azimuth angle with few samples, thereby generating high-quality target images with adjustable angle ranges. The proposed method consists of three modules: a generative fusion local module conditioned on image features, a controllable angle generation module based on sparse representation, and an angle discrimination module based on scattering point extraction. Consequently, the generative modules fuse semantically aligned features from different images to produce diverse SAR samples, whereas the angle synthesis module constructs target images within a specified angle range. The discriminative module comprises a similarity discriminator to distinguish between authentic and synthetic images to ensure the image quality, and an angle discriminator to verify that generated images conform to the specified range of the azimuth angle. Combining these modules, the proposed methodology is capable of generating azimuth angle-controllable target images using only a limited number of support samples. The effectiveness of the proposed method is not only verified through various quality metrics, but also examined through the enhanced distinguishability of target recognition methods. In our experiments, we achieved SAR image generation within a given angle range on two datasets. In terms of generated image quality, our method has significant advantages over other methods in metrics such as FID and SSIM. Specifically, the FID was reduced by up to 0.37, and the SSIM was increased by up to 0.46. In the target recognition experiments, after augmenting the data, the accuracy improved by 6.16% and 3.29% under two different pitch angles, respectively. This demonstrates that our method has great advantages in the SAR image generation task, and the research content is of great value. Full article
Show Figures

Figure 1

24 pages, 2187 KiB  
Article
PUF-Based Secure and Efficient Anonymous Authentication Protocol for UAV Towards Cross-Domain Environments
by Qi Xie and Haohua Wang
Drones 2025, 9(4), 260; https://doi.org/10.3390/drones9040260 - 28 Mar 2025
Viewed by 144
Abstract
Cross-domain authentication of drones has played an important role in emergency rescue, collaborative missions, and so on. However, the existing cross-domain authentication protocols for drones may cause privacy leakages and stolen-verifier attacks due to the storage of drone information by ground stations, and [...] Read more.
Cross-domain authentication of drones has played an important role in emergency rescue, collaborative missions, and so on. However, the existing cross-domain authentication protocols for drones may cause privacy leakages and stolen-verifier attacks due to the storage of drone information by ground stations, and drones and ground stations are susceptible to capture attacks, which may suffer from impersonation attacks. To address these problems, we propose a lightweight cross-domain authentication protocol based on physical unclonable function (PUF). In the proposed protocol, the control center is not involved in the authentication process, preventing bottleneck problems when multiple drones authenticate simultaneously. Ground stations do not store drone information, effectively safeguarding against privacy leakage and stolen-verifier attacks. PUF is utilized to protect drones from capture attacks. We conduct both informal security analysis and formal security proof to demonstrate the protocol’s security. In terms of performance, compared with relevant schemes, our protocol shows remarkable efficiency improvements. Computationally, it is 5–92% more efficient. Regarding communication overhead, it is 9–68% lower than relevant schemes. For storage, it is 22–48% lower than relevant schemes. We simulated the proposed protocol using a Raspberry Pi 4B, which emulates the computational capabilities of actual UAV and ground stations. During the simulation, a large number of authentication requests were generated. We monitored key performance indicators such as authentication success rate, response time, and resource utilization. To test its security, we simulated common attacks like replay, forgery, and impersonation. The protocol’s timestamps effectively identified and rejected replayed messages. Meanwhile, the PUF mechanism and unique signature scheme foiled our attempts to forge authentication messages. These simulation results, combined with theoretical security proofs, confirm the protocol’s practical viability and security in real-world-like scenarios. Full article
(This article belongs to the Section Drone Communications)
Show Figures

Figure 1

29 pages, 5780 KiB  
Article
Zero Trust Strategies for Cyber-Physical Systems in 6G Networks
by Abdulrahman K. Alnaim and Ahmed M. Alwakeel
Mathematics 2025, 13(7), 1108; https://doi.org/10.3390/math13071108 - 27 Mar 2025
Viewed by 173
Abstract
This study proposes a Zero Trust security framework for 6G-enabled Cyber-Physical Systems (CPS), integrating Adaptive Access Control (AAC), end-to-end encryption, and blockchain to enhance security, scalability, and real-time threat detection. As 6G networks facilitate massive device connectivity and low-latency communication, traditional perimeter-based security [...] Read more.
This study proposes a Zero Trust security framework for 6G-enabled Cyber-Physical Systems (CPS), integrating Adaptive Access Control (AAC), end-to-end encryption, and blockchain to enhance security, scalability, and real-time threat detection. As 6G networks facilitate massive device connectivity and low-latency communication, traditional perimeter-based security models are inadequate against evolving cyber threats such as Man-in-the-Middle (MITM) attacks, Distributed Denial-of-Service (DDoS), and data breaches. Zero Trust security eliminates implicit trust by enforcing continuous authentication, strict access control, and real-time anomaly detection to mitigate potential threats dynamically. The proposed framework leverages blockchain technology to ensure tamper-proof data integrity and decentralized authentication, preventing unauthorized modifications to CPS data. Additionally, AI-driven anomaly detection identifies suspicious behavior in real time, optimizing security response mechanisms and reducing false positives. Experimental evaluations demonstrate a 40% reduction in MITM attack success rates, 5.8% improvement in authentication efficiency, and 63.5% lower latency compared to traditional security methods. The framework also achieves high scalability and energy efficiency, maintaining consistent throughput and response times across large-scale CPS deployments. These findings underscore the transformative potential of Zero Trust security in 6G-enabled CPS, particularly in mission-critical applications such as healthcare, smart infrastructure, and industrial automation. By integrating blockchain-based authentication, AI-powered threat detection, and adaptive access control, this research presents a scalable and resource-efficient solution for securing next-generation CPS architectures. Future work will explore quantum-safe cryptography and federated learning to further enhance security, ensuring long-term resilience in highly dynamic network environments. Full article
(This article belongs to the Special Issue Application of Artificial Intelligence in Decision Making)
Show Figures

Figure 1

19 pages, 2534 KiB  
Article
A Cross-Chain-Based Access Control Framework for Cloud Environment
by Saad Belcaid, Mostapha Zbakh, Siham Aouad, Abdellah Touhafi and An Braeken
Future Internet 2025, 17(4), 149; https://doi.org/10.3390/fi17040149 - 27 Mar 2025
Viewed by 203
Abstract
Cloud computing presents itself as one of the leading technologies in the IT solutions field, providing a variety of services and capabilities. Meanwhile, blockchain-based solutions emerge as advantageous as they permit data immutability, transaction efficiency, transparency, and trust due to decentralization and the [...] Read more.
Cloud computing presents itself as one of the leading technologies in the IT solutions field, providing a variety of services and capabilities. Meanwhile, blockchain-based solutions emerge as advantageous as they permit data immutability, transaction efficiency, transparency, and trust due to decentralization and the use of smart contracts. In this paper, we are consolidating these two technologies into a secure framework for access control in cloud environments. A cross-chain-based methodology is used, in which transactions and interactions between multiple blockchains and cloud computing systems are supported, such that no separate third-party certificates are required in the authentication and authorization processes. This paper presents a cross-chain-based framework that integrates a full, fine-grained, attribute-based access control (ABAC) mechanism that evaluates cloud user access transaction attributes. It grants or denies access to the cloud resources by inferring knowledge about the attributes received using semantic reasoning based on ontologies, resulting in a more reliable method for information sharing over the cloud network. Our implemented cross-chain framework on the Cosmos ecosystem with the integrated semantic ABAC scored an overall access control (AC) processing time of 9.72 ms. Full article
(This article belongs to the Special Issue Cloud and Edge Computing for the Next-Generation Networks)
Show Figures

Figure 1

29 pages, 16189 KiB  
Article
Comparative Study of Chaga (Inonotus obliquus) Dietary Supplements Using Complementary Analytical Techniques
by Coleton Windsor, Anna E. Kreynes, Jeff S. Chilton, William A. Chioffi, Arun Krishnamurthy and Melissa Ishii
Int. J. Mol. Sci. 2025, 26(7), 2970; https://doi.org/10.3390/ijms26072970 - 25 Mar 2025
Viewed by 419
Abstract
Chaga (Inonotus obliquus) is an increasingly used natural product in botanical dietary supplements, valued for its bioactive compounds. However, inconsistent standardized analytical methods raise concerns over product authenticity, mislabeling, and quality control. This study employs a multi-analytical approach to differentiate wildcrafted [...] Read more.
Chaga (Inonotus obliquus) is an increasingly used natural product in botanical dietary supplements, valued for its bioactive compounds. However, inconsistent standardized analytical methods raise concerns over product authenticity, mislabeling, and quality control. This study employs a multi-analytical approach to differentiate wildcrafted chaga canker from North American chaga dietary supplements, particularly those containing mycelia fermented grain products. High-Performance Thin-Layer Chromatography (HPTLC), Liquid Chromatography with Evaporative Light Scattering Detection (LC-ELSD) or Photo/Diode Array Detection (LC-PDA/DAD), Liquid Chromatography-Quadrupole Time-of-Flight Mass Spectrometry (LC-QToF-MS), Nuclear Magnetic Resonance (NMR) spectroscopy, UV-Vis spectrophotometry, and iodine-starch assays were used to evaluate key markers, including triterpenoids, polysaccharides, and melanin. Whole chaga canker contained triterpenoids (inotodiol, trametenolic acid) and phenolics, like osmundacetone, while melanin absorbance at 500 nm differentiated it from fermented grain products. β-Glucan quantification and iodine-starch assays confirmed starch-rich composition in fermented grains and its absence in authentic chaga canker. NMR fingerprinting and LC-QToF-MS metabolomics demonstrated stark compositional deviations between wildcrafted chaga canker, I. obliquus mycelium, and fermented grain products. By integrating complementary techniques, we establish a framework that can reliably distinguish genuine chaga canker from misrepresented products, ensuring consumer safety and fostering trust in the functional mushroom, canker, and mycelium markets. Full article
(This article belongs to the Special Issue Bioactive Compounds of Natural Origin)
Show Figures

Figure 1

23 pages, 785 KiB  
Article
Efficient IoT User Authentication Protocol with Semi-Trusted Servers
by Shunfang Hu, Yuanyuan Zhang, Yanru Guo, Wang Zhong, Yanru Chen and Liangyin Chen
Sensors 2025, 25(7), 2013; https://doi.org/10.3390/s25072013 - 23 Mar 2025
Viewed by 148
Abstract
Internet of Things (IoT) user authentication protocols enable secure authentication and session key negotiation between users and IoT devices via an intermediate server, allowing users to access sensor data or control devices remotely. However, the existing IoT user authentication schemes often assume that [...] Read more.
Internet of Things (IoT) user authentication protocols enable secure authentication and session key negotiation between users and IoT devices via an intermediate server, allowing users to access sensor data or control devices remotely. However, the existing IoT user authentication schemes often assume that the servers (registration center and intermediate servers) are fully trusted, overlooking the potential risk of insider attackers. Moreover, most of the existing schemes lack critical security properties, such as resistance to ephemeral secret leakage attacks and offline password guessing attacks, and they are unable to provide perfect forward security. Furthermore, with the rapid growth regarding IoT devices, the servers must manage a large number of users and device connections, making the performance of the authentication scheme heavily reliant on the server’s computational capacity, thereby impacting the system’s scalability and efficiency. The design of security protocols is based on the underlying security model, and the current IoT user authentication models fail to cover crucial threats like insider attacks and ephemeral secret leakage. To overcome these limitations, we propose a new security model, IoT-3eCK, which assumes semi-trusted servers and strengthens the adversary model to better meet the IoT authentication requirements. Based on this model, we design an efficient protocol that ensures user passwords, biometric data, and long-term keys are protected from insider users during registration, mitigating insider attacks. The protocol also integrates dynamic pseudo-identity anonymous authentication and ECC key exchange to satisfy the security properties. The performance analysis shows that, compared to the existing schemes, the new protocol reduces the communication costs by over 23% and the computational overhead by more than 22%, with a particularly significant reduction of over 95% in the computational overhead at the intermediate server. Furthermore, the security of the protocol is rigorously demonstrated using the random oracle model and verified with automated tools, further confirming its security and reliability. Full article
Show Figures

Figure 1

24 pages, 358 KiB  
Review
Integrated Nematode Management Strategies: Optimization of Combined Nematicidal and Multi-Functional Inputs
by Mahfouz M. M. Abd-Elgawad
Plants 2025, 14(7), 1004; https://doi.org/10.3390/plants14071004 - 23 Mar 2025
Viewed by 347
Abstract
Considerable losses are inflicted by plant-parasitic nematodes (PPNs) due to their obligate parasitism; serious damage occurs in many susceptible crops, and the parasites have a broad distribution worldwide. As most PPNs have a subterranean nature, the complexity of soils in the plant rhizosphere [...] Read more.
Considerable losses are inflicted by plant-parasitic nematodes (PPNs) due to their obligate parasitism; serious damage occurs in many susceptible crops, and the parasites have a broad distribution worldwide. As most PPNs have a subterranean nature, the complexity of soils in the plant rhizosphere and the structures and functions of the soil food webs necessitate a grasp of the relevant biotic/abiotic factors in order to ensure their effective control. Such factors frequently lead to the inconsistent performance and untapped activity of applied bionematicides, hindering efforts to develop reliable ones. Research efforts that take these factors into account to back the usage of these bionematicides by combining the disease-suppressive activities of two or more agricultural inputs are highlighted herein. These combinations should be designed to boost useful colonization in the rhizosphere, persistent expression of desirable traits under a wide range of soil settings, and/or antagonism to a larger number of plant pests/pathogens relative to individual applications. Relevant ecological/biological bases with specific settings for effective PPN management are exemplified. Determining the relative sensitivity or incompatibility of some biologicals entails studying their combinations and reactions. Such studies, as suggested herein, should be conducted on a case-by-case basis to avoid unsatisfactory outputs. These studies will enable us to accurately define certain outputs, namely, the synergistic, additive, neutral, and antagonistic interactions among the inputs. In optimizing the efficiencies of these inputs, researchers should consider their multi-functionality and metabolic complementarity. Despite previous research, the market currently lacks these types of safe and effective products. Hence, further explorations of novel integrated pest management plans that boost synergy and coverage to control multiple pathogens/pests on a single crop are required. Also, setting economic incentives and utilizing a standardized regulation that examines the authentic risks of biopesticides are still called for in order to ease cost-effective formulation, registration, farmer awareness, and usage worldwide. On the other hand, tank mixing that ensures legality and avoids physical and chemical agro-input-based incompatibilities can also provide superior merits. The end in view is the unraveling of the complexities of interactions engaged with in applying multiple inputs to develop soundly formulated, safe, and effective pesticides. Sophisticated techniques should be incorporated to overcome such complexities/limitations. These techniques would engage microencapsulation, nanopesticides, volatile organic compounds as signals for soil inhabitants, bioinformatics, and RNA-Seq in pesticide development. Full article
(This article belongs to the Special Issue New Strategies for the Control of Plant-Parasitic Nematodes)
19 pages, 1915 KiB  
Article
Chaos-Based Dynamic Authentication for Secure Telehealth in Smart Cities
by Mostafa Nofal and Rania A. Elmanfaloty
Modelling 2025, 6(2), 25; https://doi.org/10.3390/modelling6020025 - 21 Mar 2025
Viewed by 128
Abstract
The rise of telehealth in smart cities has introduced both opportunities and challenges, particularly in securing sensitive patient data and ensuring reliable authentication. This paper presents a chaos-based dynamic authentication scheme designed to address these challenges. Utilizing the inherent unpredictability and sensitivity of [...] Read more.
The rise of telehealth in smart cities has introduced both opportunities and challenges, particularly in securing sensitive patient data and ensuring reliable authentication. This paper presents a chaos-based dynamic authentication scheme designed to address these challenges. Utilizing the inherent unpredictability and sensitivity of chaotic systems, the proposed method ensures robust protection against various attacks, including replay, brute-force, man-in-the-middle, collision, and parameter prediction. The scheme operates through a dynamic challenge–response mechanism using chaotic maps, which generate highly unpredictable authentication parameters. Simulations demonstrate the system’s strong resilience, minimal collision rate, and adaptability to diverse telehealth devices. By safeguarding sensitive telehealth data and promoting secure access control, this research provides a foundational framework for implementing secure authentication systems in smart cities. Future directions include real-world deployment and integration with advanced technologies like blockchain to further enhance security and scalability. Full article
Show Figures

Figure 1

20 pages, 4324 KiB  
Article
A Secure and Scalable Authentication and Communication Protocol for Smart Grids
by Muhammad Asfand Hafeez, Kazi Hassan Shakib and Arslan Munir
J. Cybersecur. Priv. 2025, 5(2), 11; https://doi.org/10.3390/jcp5020011 - 21 Mar 2025
Viewed by 313
Abstract
The growing adoption of smart grid systems presents significant advancements in the efficiency of energy distribution, along with enhanced monitoring and control capabilities. However, the interconnected and distributed nature of these systems also introduces critical security vulnerabilities that must be addressed. This study [...] Read more.
The growing adoption of smart grid systems presents significant advancements in the efficiency of energy distribution, along with enhanced monitoring and control capabilities. However, the interconnected and distributed nature of these systems also introduces critical security vulnerabilities that must be addressed. This study proposes a secure communication protocol specifically designed for smart grid environments, focusing on authentication, secret key establishment, symmetric encryption, and hash-based message authentication to provide confidentiality and integrity for communication in smart grid environments. The proposed protocol employs the Elliptic Curve Digital Signature Algorithm (ECDSA) for authentication, Elliptic Curve Diffie–Hellman (ECDH) for secure key exchange, and Advanced Encryption Standard 256 (AES-256) encryption to protect data transmissions. The protocol follows a structured sequence: (1) authentication—verifying smart grid devices using digital signatures; (2) key establishment—generating and securely exchanging cryptographic keys; and (3) secure communication—encrypting and transmitting/receiving data. An experimental framework has been established to evaluate the protocol’s performance under realistic operational conditions, assessing metrics such as time, throughput, power, and failure recovery. The experimental results show that the protocol completes one server–client request in 3.469 ms for a desktop client and 41.14 ms for a microcontroller client and achieves a throughput of 288.27 requests/s and 24.30 requests/s, respectively. Furthermore, the average power consumed by the protocol is 37.77 watts. The results also show that the proposed protocol is able to recover from transient network disruptions and sustain secure communication. Full article
Show Figures

Figure 1

Back to TopTop