Results 101 to 110 of about 815,217 (293)
Computer abuse and security: Update on an empirical pilot study [PDF]
Detmar W. Straub
openalex +1 more source
3D Printed Ultra‐Fast Plastic Scintillators Based on Perovskite‐Photocurable Polymer Composite
The demand for radiation detection is increasing in a number of fields, including high‐energy physics, medical imaging, and homeland security. This study serves to demonstrate the potential for the fabrication of fast perovskite‐based scintillators with complex shapes via stereolithographic additive manufacturing, representing a new path toward the ...
Antonella Giuri+16 more
wiley +1 more source
MPSM: Multi-prospective PaaS Security Model [PDF]
Cloud computing has brought a revolution in the field of information technology and improving the efficiency of computational resources. It offers computing as a service enabling huge cost and resource efficiency. Despite its advantages, certain security issues still hinder organizations and enterprises from it being adopted.
arxiv
Formal specification of fault-tolerance and its relation to computer security [PDF]
Dorian Weber
openalex +1 more source
Structurally Colored Physically Unclonable Functions with Ultra‐Rich and Stable Encoding Capacity
This study reports a design strategy for generating bright‐field resolvable physically unclonable functions with extremely rich encoding capacity coupled with outstanding thermal and chemical stability. The optical response emerges from thickness‐dependent structural color formation in ZnO features, which are fabricated by physical vapor deposition ...
Abidin Esidir+8 more
wiley +1 more source
Ultrathin, flexible neural probes are developed with an innovative, biomimetic design incorporating brain tissue‐compatible materials. The material system employs biomolecule‐based encapsulation agents to mitigate inflammatory responses, as demonstrated through comprehensive in vitro and in vivo studies.
Jeonghwa Jeong+7 more
wiley +1 more source
A new method of verification of security protocols [PDF]
In the paper we introduce a process model of security protocols, where processes are graphs with edges labelled by actions, and present a new method of specification and verification of security protocols based on this model.
arxiv
A materials and device design concept that comprises a self‐assembled ultra‐thin epitaxial ion‐transporting layer, an amorphous oxide overcoat oxygen‐blocking layer, and a partial filament formed during an electroforming step is proposed for low‐current multilevel resistive switching devices.
Ming Xiao+17 more
wiley +1 more source
This review covers the recent advances in the synthesis and properties of stable radical polymers (SRPs) and presents their applications in electronics, magnetics, optoelectronics, and biomedicines. The review concludes with a discussion of the challenges in radical chemistry and functionalization, while shedding light on the groundbreaking potential ...
Yufeng Xiong+11 more
wiley +1 more source