Results 71 to 80 of about 76,752 (276)

Hydrogel‐Based Vat Photopolymerization of Ceramics and Metals with Low Shrinkages via Repeated Infusion Precipitation

open access: yesAdvanced Materials, EarlyView.
This work introduces an in situ precipitation strategy for the hydrogel‐based vat photopolymerization of architected ceramics and metals with reduced shrinkages and improved densities. Repeated infusion‐precipitation significantly increases metal loading within the hydrogels, which improves part quality after thermal conversion.
Yiming Ji   +3 more
wiley   +1 more source

Quantum cryptography: a practical information security perspective [PDF]

open access: yes, 2009
Quantum Key Exchange (QKE, also known as Quantum Key Distribution or QKD) allows communicating parties to securely establish cryptographic keys. It is a well-established fact that all QKE protocols require that the parties have access to an authentic ...
Paterson, Kenneth G.   +2 more
core   +1 more source

The Horcrux Protocol: A Method for Decentralized Biometric-based Self-sovereign Identity

open access: yes, 2017
Most user authentication methods and identity proving systems rely on a centralized database. Such information storage presents a single point of compromise from a security perspective.
Callahan, John, Othman, Asem
core   +1 more source

Transient Charging of Mixed Ionic‐Electronic Conductors by Anomalous Diffusion

open access: yesAdvanced Materials, EarlyView.
This article explores charge transport in mixed ionic‐electronic conductors (MIECs) through electrochemical impedance spectroscopy and transient current analysis. Focusing on PEDOT:PSS, WO3, and n‐doped PBDF, it uncovers the impact of anomalous diffusion via fractional modeling. The study reveals key correlations that deepen understanding and guide the
Heyi Zhang   +9 more
wiley   +1 more source

Medical Malpractice: A Comparative Perspective Between China and the United States

open access: yesContemporary Social Sciences, 2020
At the beginning of the 1970s, the United States turned onto the winding road of medical malpractice compensation. With the goal of properly dealing with this issue, the United States embarked on a process of continuous reform.
Wang Yihan and Wang Zhu
doaj   +1 more source

Counterintuitive Fluorescence Blue Shift in Symmetry Breaking Dicationic Bis(indolium) with Two‐Photon Absorption Properties for NIR Living Cell Imaging

open access: yesAdvanced Materials, EarlyView.
Highly water‐soluble dicationic bis(indolium) dyes have been prepared, showing excellent two‐photon absorption and light emission. Their fluorescence behavior discloses an unusual increasing blue shift with increasing solvent polarity, which, in parallel, is beneficial for enhanced detection in biological media.
Carlos Benitez‐Martin   +5 more
wiley   +1 more source

Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network

open access: yesEmitter: International Journal of Engineering Technology, 2016
MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile,
Samsul Huda   +2 more
doaj   +3 more sources

Application of public key infrastructure in telecom operators

open access: yesDianxin kexue, 2020
With the implementation of cryptography law,the application of cryptography in information system in China has been promoted to the legal level,which requires the application of public key infrastructure in the mutual trust of network entities to be ...
Congli WANG, Jinhua WANG, Weijia XUE
doaj   +2 more sources

Lithographically Controlled Liquid Metal Diffusion in Graphene: Fabrication and Magnetotransport Signatures of Superconductivity

open access: yesAdvanced Materials, EarlyView.
Lithography‐guided intercalation creates a proximitized 2D superconducting Ga layer under graphene Hall bars via liquid‐metal intercalation. The image shows a Hall bar where Ga atoms from the liquid phase enter through patterned intercalation channels beneath quasi‐freestanding bilayer graphene, forming a confined 2D metal that demonstrates ...
Stefan Wundrack   +18 more
wiley   +1 more source

Key Management Building Blocks for Wireless Sensor Networks [PDF]

open access: yes, 2007
Cryptography is the means to ensure data confidentiality, integrity and authentication in wireless sensor networks (WSNs). To use cryptography effectively however, the cryptographic keys need to be managed properly.
Doumen, J.M., Law, Y.W., Palaniswami, M.
core   +2 more sources

Home - About - Disclaimer - Privacy