Results 71 to 80 of about 253,734 (274)
CoD-DSSE: A practical efficient dynamic searchable symmetric encryption with lightweight clients
Dynamic searchable symmetric encryption(DSSE) combines dynamic update with searchable encryption, allowing users to not only achieve keyword retrieval, but also dynamically update encrypted data stored on semi-trusted cloud server, effectively protecting
Ze Zhu, Wanshan Xu, Junfeng Xu
doaj +1 more source
Secure Deterministic Communication Without Entanglement
We propose a protocol for deterministic communication that does not make use of entanglement. It exploits nonorthogonal states in a two-way quantum channel attaining significant improvement of security and efficiency over already known cryptographic ...
A. Beige +3 more
core +1 more source
In this strategy, a conductive nano‐probe is employed to induce nanoscale phase transitions and map the nanoscale conductivity and trap density of GST films. By utilizing the contrasting properties of phase‐change states, nano‐resonators are fabricated that exhibit plasmonic conduction and dramatically different transport characteristics.
Sunwoo Bang +4 more
wiley +1 more source
BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid
In smart grid, phaser measurement units (PMUs) can upload readings to utility centers via supervisory control and data acquisition (SCADA) or energy management system (EMS) to enable intelligent controlling and scheduling.
Wei Ren, Jun Song, Min Lei, Yi Ren
doaj +1 more source
Strong and Provably Secure Database Access Control
Existing SQL access control mechanisms are extremely limited. Attackers can leak information and escalate their privileges using advanced database features such as views, triggers, and integrity constraints.
Basin, David +2 more
core +1 more source
Meta‐Rod Mechanical Metamaterials With Programmable Reconfiguration
Existing mechanical metamaterials achieve programmable large deformations in planar square or cubic configurations, restricted by required complex boundary conditions. This research proposes a 1D metamaterial, Meta‐rod, with linear, bending, twisting, area, and volume deformation modes.
Atharva Pande, Lyes Kadem, Hang Xu
wiley +1 more source
On the Privacy of Two Tag Ownership Transfer Protocols for RFIDs [PDF]
In this paper, the privacy of two recent RFID tag ownership transfer protocols are investigated against the tag owners as adversaries. The first protocol called ROTIV is a scheme which provides a privacy-preserving ownership transfer by using an HMAC ...
Abyaneh, Mohammad Reza Sohizadeh
core +1 more source
Security of two-way quantum cryptography against asymmetric Gaussian attacks
Recently, we have shown the advantages of two-way quantum communications in continuous variable quantum cryptography. Thanks to this new approach, two honest users can achieve a non-trivial security enhancement as long as the Gaussian interactions of an ...
Braunstein, Samuel L. +3 more
core +1 more source
Covalent organic frameworks (COFs) with metals have been recognized as versatile platforms for photocatalytic CO2 reduction (CO2PRR). Herein, an overview of metal integration strategies for COFs is systematically summarized. Regulatory mechanisms and structure–activity relationships between metal integration and COF‐based CO2PRR are emphasized.
Jie He +5 more
wiley +1 more source
Practical Attacks on a RFID Authentication Protocol Conforming to EPC C-1 G-2 Standard
Yeh et al. recently have proposed a mutual authentication protocol based on EPC Class-1 Gen.-2 standard [1]. They have claimed that their protocol is secure against adversarial attacks and also provides forward secrecy.
Alaghband, Mahdi R. +2 more
core +1 more source

