Results 101 to 110 of about 1,678,458 (327)

Formal Computational Unlinkability Proofs of RFID Protocols

open access: yes, 2017
We set up a framework for the formal proofs of RFID protocols in the computational model. We rely on the so-called computationally complete symbolic attacker model. Our contributions are: i) To design (and prove sound) axioms reflecting the properties of
Comon, Hubert, Koutsos, Adrien
core   +1 more source

The Promise of Solid Lubricants for a Sustainable Future

open access: yesAdvanced Materials, EarlyView.
Lubricants are vital for technology, saving energy and resources. The industry seeks sustainable solutions beyond fossil fuels. Solid lubricants offer extremely low friction and reduce environmental impact, especially in harsh conditions. Can these solids truly replace liquid lubricants, or are they limited to extreme applications?
Philipp G. Grützmacher   +7 more
wiley   +1 more source

The First Review on Nano‐Agricultural Applications of MXene and MBene‐Based Materials for Plant‐Immunoengineering, Controlled Protection, and Inducing Biostimulation Mechanisms

open access: yesAdvanced Materials, EarlyView.
MXene and MBene nanomaterials show significant potential in addressing critical challenges in biomedicine, applied biology, agriculture, and the environment. From a nano‐agricultural perspective, this relatively young field has witnessed emerging advances towards applications for plant‐immunoengineering, biostimulation, and controlled delivery ...
Alireza Rafieerad   +3 more
wiley   +1 more source

An Energy Aware and Secure MAC Protocol for Tackling Denial of Sleep Attacks in Wireless Sensor Networks [PDF]

open access: yes, 2019
Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful energy awareness is essential when working with these devices.
Udoh, E., Udoh, E.
core  

On the dynamics of chemical reactions of negative ions

open access: yes, 2010
This review discusses the dynamics of negative ion reactions with neutral molecules in the gas phase. Most anion-molecule reactions proceed via a qualitatively different interaction potential than cationic or neutral reactions.
Mikosch, Jochen   +2 more
core   +1 more source

Developments in Nanopatterning of Graphene; Toward Direct Writing

open access: yesAdvanced Materials, EarlyView.
Overview of principal direct‐write graphene patterning methodologies including focused electron beam induced deposition (FEBID), laser induced graphitisation (LIG), focused ion beam (FIB), scanning tunneling microscopy (STM) and atomic force microscopy (AFM) Abstract Graphene, with its exceptional electronic, mechanical, and thermal properties, remains
Szymon Abrahamczyk   +4 more
wiley   +1 more source

Research on the multi-message modification techniques on MD5

open access: yesTongxin xuebao, 2009
According to research on the message modification techniques presented by Wang Xiaoyun et al and the advanced message modification techniques proposed by Yu Sasaki et al, the multi-message modification techniques were founded to not be always able to ...
CHEN Shi-wei, JIN Chen-hui
doaj  

Study of Solid Particle Erosion on Helicopter Rotor Blades Surfaces

open access: yesApplied Sciences, 2020
In this study, titanium alloy (Ti-4Al-1.5Mn), magnesium alloy (Mg-Li9-A3-Zn3), or aluminum alloy (Al7075-T6) were used to construct the shell model of helicopter rotor blade to study the solid particle erosion of helicopter rotor blades.
Xupeng Bai   +4 more
doaj   +1 more source

One Password: An Encryption Scheme for Hiding Users' Register Information

open access: yes, 2017
In recent years, the attack which leverages register information (e.g. accounts and passwords) leaked from 3rd party applications to try other applications is popular and serious. We call this attack "database collision".
Zhao, Bo, Zhou, Yu
core  

Home - About - Disclaimer - Privacy