Results 71 to 80 of about 253,734 (274)

CoD-DSSE: A practical efficient dynamic searchable symmetric encryption with lightweight clients

open access: yesJournal of King Saud University: Computer and Information Sciences
Dynamic searchable symmetric encryption(DSSE) combines dynamic update with searchable encryption, allowing users to not only achieve keyword retrieval, but also dynamically update encrypted data stored on semi-trusted cloud server, effectively protecting
Ze Zhu, Wanshan Xu, Junfeng Xu
doaj   +1 more source

Secure Deterministic Communication Without Entanglement

open access: yes, 2004
We propose a protocol for deterministic communication that does not make use of entanglement. It exploits nonorthogonal states in a two-way quantum channel attaining significant improvement of security and efficiency over already known cryptographic ...
A. Beige   +3 more
core   +1 more source

Nanoscale Mapping of Plasmonic Charge Transport in Nano‐Resonators Based on Resistive Switching Materials

open access: yesAdvanced Functional Materials, EarlyView.
In this strategy, a conductive nano‐probe is employed to induce nanoscale phase transitions and map the nanoscale conductivity and trap density of GST films. By utilizing the contrasting properties of phase‐change states, nano‐resonators are fabricated that exhibit plasmonic conduction and dramatically different transport characteristics.
Sunwoo Bang   +4 more
wiley   +1 more source

BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid

open access: yesInternational Journal of Digital Multimedia Broadcasting, 2011
In smart grid, phaser measurement units (PMUs) can upload readings to utility centers via supervisory control and data acquisition (SCADA) or energy management system (EMS) to enable intelligent controlling and scheduling.
Wei Ren, Jun Song, Min Lei, Yi Ren
doaj   +1 more source

Strong and Provably Secure Database Access Control

open access: yes, 2015
Existing SQL access control mechanisms are extremely limited. Attackers can leak information and escalate their privileges using advanced database features such as views, triggers, and integrity constraints.
Basin, David   +2 more
core   +1 more source

Meta‐Rod Mechanical Metamaterials With Programmable Reconfiguration

open access: yesAdvanced Functional Materials, EarlyView.
Existing mechanical metamaterials achieve programmable large deformations in planar square or cubic configurations, restricted by required complex boundary conditions. This research proposes a 1D metamaterial, Meta‐rod, with linear, bending, twisting, area, and volume deformation modes.
Atharva Pande, Lyes Kadem, Hang Xu
wiley   +1 more source

On the Privacy of Two Tag Ownership Transfer Protocols for RFIDs [PDF]

open access: yes, 2012
In this paper, the privacy of two recent RFID tag ownership transfer protocols are investigated against the tag owners as adversaries. The first protocol called ROTIV is a scheme which provides a privacy-preserving ownership transfer by using an HMAC ...
Abyaneh, Mohammad Reza Sohizadeh
core   +1 more source

Security of two-way quantum cryptography against asymmetric Gaussian attacks

open access: yes, 2008
Recently, we have shown the advantages of two-way quantum communications in continuous variable quantum cryptography. Thanks to this new approach, two honest users can achieve a non-trivial security enhancement as long as the Gaussian interactions of an ...
Braunstein, Samuel L.   +3 more
core   +1 more source

Covalent Organic Frameworks for Photocatalytic CO2 Reduction: Metal Integration Principles, Strategies and Functions

open access: yesAdvanced Functional Materials, EarlyView.
Covalent organic frameworks (COFs) with metals have been recognized as versatile platforms for photocatalytic CO2 reduction (CO2PRR). Herein, an overview of metal integration strategies for COFs is systematically summarized. Regulatory mechanisms and structure–activity relationships between metal integration and COF‐based CO2PRR are emphasized.
Jie He   +5 more
wiley   +1 more source

Practical Attacks on a RFID Authentication Protocol Conforming to EPC C-1 G-2 Standard

open access: yes, 2011
Yeh et al. recently have proposed a mutual authentication protocol based on EPC Class-1 Gen.-2 standard [1]. They have claimed that their protocol is secure against adversarial attacks and also provides forward secrecy.
Alaghband, Mahdi R.   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy