Results 71 to 80 of about 136,963 (275)
Grayscale Image Authentication using Neural Hashing
Many different approaches for neural network based hash functions have been proposed. Statistical analysis must correlate security of them. This paper proposes novel neural hashing approach for gray scale image authentication.
Kutlu, Yakup, Yayık, Apdullah
core +2 more sources
Liquid metal additives are processed in elastomer host resulting in highly conductive and stretchable composites. The material functions as a piezoresistive sensor with minimal drift, low stiffness, and enhanced operating range. The film can replace wires to charge a mobile phone at ∼350% strain and monitors bodily motion in real‐time via a portable ...
Patryk Wojciak +3 more
wiley +1 more source
In this paper, we describe attacks on the recently proposed Haraka hash functions. First, for the two hash functions Haraka-256/256 and Haraka-512/256 in the family, we show how two colliding messages can be constructed in about 216 function ...
Jérémy Jean
doaj +1 more source
Attacks on quantum key distribution protocols that employ non-ITS authentication
We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously.
A Abidin +25 more
core +1 more source
Collision‐Resilient Winged Drones Enabled by Tensegrity Structures
Based on structures of birds such as the woodpeck, this article presents the collision‐resilient aerial robot, SWIFT. SWIFT leverages tensegrity structures in the fuselage and wings which allow it to undergo large deformations in a crash, without sustaining damage. Experiments show that SWIFT can reduce impact forces by 70% over conventional structures.
Omar Aloui +5 more
wiley +1 more source
This review identifies key design considerations for insect‐inspired microrobots capable of multimodal locomotion. To draw inspiration, biological and robotic strategies for moving in air, on water surfaces, and underwater are examined, along with approaches for crossing the air–water interface.
Mija Jovchevska +2 more
wiley +1 more source
Research and design of authenticated encryption algorithm based on AES round function
The authenticated encryption algorithm guarantees the confidentiality and integrity of the information at the same time, and has extensive research and application prospects in the field of information security. With the mixed integer linear programming
GAO Guoqiang, LI Zichen
doaj +3 more sources
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160
RIPEMD-160 is a hash function published in 1996, which shares similarities with other hash functions designed in this time-period like MD4, MD5 and SHA-1.
Fukang Liu +5 more
doaj +1 more source
An Energy Aware and Secure MAC Protocol for Tackling Denial of Sleep Attacks in Wireless Sensor Networks [PDF]
Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful energy awareness is essential when working with these devices.
Udoh, E., Udoh, E.
core
An enhanced universal gripper combining rigid mechanics with self‐adaptable fingers is presented for industrial automation. The novel six‐bar linkage with integrated compliant pad eliminates mechanical interference while enabling passive shape adaptation.
Muhammad Usman Khalid +7 more
wiley +1 more source

