Results 61 to 70 of about 429,644 (328)
Security Trust Zone in 5G Networks
Fifth Generation (5G) telecommunication system is going to deliver a flexible radio access network (RAN). Security functions such as authorization, authentication and accounting (AAA) are expected to be distributed from central clouds to edge clouds.
Dohler, Mischa+4 more
core +1 more source
Designing Physical Unclonable Functions From Optically Active Materials
Assigning unforgeable “fingerprints” to manufactured goods is a key strategy to fight global counterfeiting. Optical physical unclonable functions (PUFs) are chemically generated random patterns of optically active materials serving as unique authenticators.
Maxime Klausen+2 more
wiley +1 more source
Moving towards Cloud Security [PDF]
Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security.
Rajnai, Zoltán, Rubóczki, Edit
openaire +3 more sources
This review explores the transformative role of AI in biosensor technology and provides a holistic interdisciplinary perspective that covers a broader scope of AI‐enabled biosensor technologies across various sectors including healthcare, environmental monitoring, food safety, and agriculture. It also highlights the important role of novel materials in
Tuğba Akkaş+4 more
wiley +1 more source
Cloud security has been widely considered as the key factor restricting its development since the cloud computing technology emerged.The insecure factors of cloud computing system and the secure factors which cloud computing brings were presented and ...
Qunying Sun, Zhiyuan Hu
doaj +2 more sources
A systematic literature review of cloud computing in eHealth
Cloud computing in eHealth is an emerging area for only few years. There needs to identify the state of the art and pinpoint challenges and possible directions for researchers and applications developers.
Bai, Guohua, Hu, Yan
core +2 more sources
Water impacting, freezing, melting, and being mechanically removed from the designed dielectric surfaces generates a triboeletric signal that can be used to detect various icing and de‐icing scenarios. The charge transferred directly scales with the interfacial fracture mechanism, further validating triboelectricity as an excellent ice‐detection ...
Kamran Alasvand Zarasvand+12 more
wiley +1 more source
A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications
Cloud computing is significantly reshaping the computing industry built around core concepts such as virtualization, processing power, connectivity and elasticity to store and share IT resources via a broad network.
Ethelbert, Obinna+3 more
core +1 more source
Mucosa‐Interfacing Capsule for In Situ Sensing the Elasticity of Biological Tissues
A fundamental mechanism of palpating soft materials is reported to sense deep tissue elasticity in situ with minimal invasion using the interaction between the robot palpation unit and soft tissues. Both the robot locomotion and elasticity sensing functions are remotely controlled by external magnetic fields, while the sensing data are wirelessly ...
Kiyoung Kim+10 more
wiley +1 more source
Advanced Time Series Data Processing Using Various Memristor‐Integrated Devices
Memristor‐based temporal kernels (TKs) offer compact, energy‐efficient solutions for real‐time time‐series processing in edge devices. This perspective outlines key TK architectures, compares them with conventional reservoir computing, and highlights their application in tasks such as health monitoring, authentication, and anomaly detection ...
Sung Keun Shim+9 more
wiley +1 more source