Results 101 to 110 of about 80,103 (295)
The development of polarization‐sensitive ultraviolet photodetectors is limited by poor heterojunction quality and low polarization sensitivity. This study integrates synthesized CsAg2I3 single crystals with intrinsic non‐centrosymmetry into van der Waals heterojunction devices, demonstrating pronounced pyro‐phototronic effect.
Yalin Zhai +9 more
wiley +1 more source
KEDUDUKAN DAN KEKUATAN PEMBUKTIAN DEEPFAKE DALAM PROSES PERSIDANGAN
Technological advancement has extended to the rapid development of artificial intelligence (AI), which has the capacity to facilitate human work and activities.
Soffyan Angga Fahlani +3 more
doaj +1 more source
RRAM Variability Harvesting for CIM‐Integrated TRNG
This work demonstrates a compute‐in‐memory‐compatible true random number generator that harvests intrinsic cycle‐to‐cycle variability from a 1T1R RRAM array. Parallel entropy extraction enables high‐throughput bit generation without dedicated circuits. This approach achieves NIST‐compliant randomness and low per‐bit energy, offering a scalable hardware
Ankit Bende +4 more
wiley +1 more source
Key Management Building Blocks for Wireless Sensor Networks [PDF]
Cryptography is the means to ensure data confidentiality, integrity and authentication in wireless sensor networks (WSNs). To use cryptography effectively however, the cryptographic keys need to be managed properly.
Doumen, J.M., Law, Y.W., Palaniswami, M.
core +2 more sources
Towards Security Goals in Summative E-Assessment Security
The general security goals of a computer system are known to include confidentiality, integrity and availability (C-I-A) which prevent critical assets from potential threats.
Apampa, K.M, Argles, D, Wills, G.B
core +1 more source
ABSTRACT Layered 2D materials are considered as promising for memristive applications due to their ultimate vertical scalability compared to conventional semiconductor films and pronounced hysteresis properties. Bias‐resolved Raman and Photoluminescence mapping is used to quantify strain from phonon shifts and carrier density from the exciton‐trion ...
Vladislav Kurtash +4 more
wiley +1 more source
Topological Materials and Related Applications
This review covers topological materials—including topological insulators, quantum valley Hall and quantum spin Hall insulators, and topological Weyl and Dirac semimetals—as well as their most recent advancements in fields such as spintronics, electronics, photonics, thermoelectrics, and catalysis.
Carlo Grazianetti +9 more
wiley +1 more source
Chip and Skim: cloning EMV cards with the pre-play attack [PDF]
EMV, also known as "Chip and PIN", is the leading system for card payments worldwide. It is used throughout Europe and much of Asia, and is starting to be introduced in North America too. Payment cards contain a chip so they can execute an authentication
Anderson, Ross +4 more
core +1 more source
Large Language Model in Materials Science: Roles, Challenges, and Strategic Outlook
Large language models (LLMs) are reshaping materials science. Acting as Oracle, Surrogate, Quant, and Arbiter, they now extract knowledge, predict properties, gauge risk, and steer decisions within a traceable loop. Overcoming data heterogeneity, hallucinations, and poor interpretability demands domain‐adapted models, cross‐modal data standards, and ...
Jinglan Zhang +4 more
wiley +1 more source
TrusNet: Peer-to-Peer Cryptographic Authentication [PDF]
Originally, the Internet was meant as a general purpose communication protocol, transferring primarily text documents between interested parties. Over time, documents expanded to include pictures, videos and even web pages.
Bedard, Adrian, Bedard, Jonathan
core +1 more source

