Results 41 to 50 of about 211,629 (261)
Understanding Realistic Attacks on Airborne Collision Avoidance Systems [PDF]
Airborne collision avoidance systems provide an onboard safety net should normal air traffic control procedures fail to keep aircraft separated. These systems are widely deployed and have been constantly refined over the past three decades, usually in response to near misses or mid-air collisions.
arxiv
Current Trends and Future Perspective for Cold Spray Metal‐Ceramic Composites
The use of cold spray (CS) technology for creating cermet deposits, combining ceramic and metallic components, is advancing rapidly. Cermets offer excellent temperature handling and erosion resistance for diverse applications. This review outlines the current state of the art, focusing on the deposition dynamics and strategies to optimize the ...
Romario A. Wicaksono+2 more
wiley +1 more source
Hybrid Framework Materials: Next‐Generation Engineering Materials
Hybrid organic–inorganic materials merge the unique properties of organic and inorganic compounds, enabling applications in optoelectronics, gas storage, and catalysis. This review explores metal‐organic frameworks, hybrid organic–inorganic perovskites, and the emerging field of hybrid glasses, emphasizing their structures, functionalities, and ...
Jay McCarron+2 more
wiley +1 more source
Remote booting in a hostile world: to whom am I speaking? [Computer security] [PDF]
“This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders.
Christianson, B., Lomas, M.
core +1 more source
PBTTT‐OR‐R, a C14‐alkoxy/alkyl‐PBTTT polymer derivative, is of substantial interest for optoelectronics due to its specific fullerene intercalation behavior and enhanced charge‐transfer absorption. Comparing this polymer with (S) and without (O) homocoupling defects reveals that PBTTT‐OR‐R(O) forms stable co‐crystals with PC61BM, while PBTTT‐OR‐R(S ...
Zhen Liu+14 more
wiley +1 more source
Research and design of authenticated encryption algorithm based on AES round function
The authenticated encryption algorithm guarantees the confidentiality and integrity of the information at the same time, and has extensive research and application prospects in the field of information security. With the mixed integer linear programming
GAO Guoqiang, LI Zichen
doaj +3 more sources
Chosen-Prefix Collisions on AES-like Hashing
Chosen-prefix collision (CPC) attack was first presented by Stevens, Lenstra and de Weger on MD5 at Eurocrypt 2007. A CPC attack finds a collision for any two chosen prefixes, which is a stronger variant of collision attack. CPCs are naturally harder to
Shiyao Chen+3 more
doaj +1 more source
Improvement on a Masked White-Box Cryptographic Implementation
White-box cryptography is a software technique to protect secret keys of cryptographic algorithms from attackers who have access to memory. By adapting techniques of differential power analysis to computation traces consisting of runtime information ...
Seungkwang Lee, Myungchul Kim
doaj +1 more source
Denying Collision In The Second Round Of Keccak Hash Function By Camouflaging Free Bits [PDF]
Keccak Hash Function is the winner of SHA3 competition. Hash function collision has become one of the fundamental problem in Keccak Hash Function. One of the attack which is based on collision has been proposed by Plasencia, et.al.
RATNA PUSPITA DEWI
core
Heterostructures have emerged as advanced electrocatalysts to convert earth‐abundant simple molecules into high‐value‐added products. On the basis of atomistic understanding to accelerate the electrochemical processes, the architecture of heterostructured electrocatalysts is comprehensively discussed from the point of view of modulating electronic ...
Yun Li+3 more
wiley +1 more source