Results 31 to 40 of about 5,022 (206)

Generating Dynamic Structures Through Physics‐Based Sampling of Predicted Inter‐Residue Geometries

open access: yesAdvanced Science, EarlyView.
While static structure prediction has been revolutionized, modeling protein dynamics remains elusive. trRosettaX2‐Dynamics is presented to address this challenge. This framework leverages a Transformer‐based network to predict inter‐residue geometric constraints, guiding conformation generation via physics‐based iterative sampling. The resulting method
Chenxiao Xiang   +3 more
wiley   +1 more source

How to Formalize Loop Iterations in Cryptographic Protocols Using ProVerif

open access: yesIEEE Access
The formal verification of cryptographic protocols has been extensively studied in recent years. To verify the cryptographic protocol security, formal verification tools consider protocol properties as interactive processes involving a cryptographic ...
Takehiko Mieno   +3 more
doaj   +1 more source

Programming Cryptographic Protocols [PDF]

open access: yes, 2005
Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principals engaging in it. Moreover, trust management assertions may be attached to protocol actions, constraining the behavior of a principal to be compatible with its own trust policy.
Joshua D. Guttman   +3 more
openaire   +1 more source

Multimodal Wearable Biosensing Meets Multidomain AI: A Pathway to Decentralized Healthcare

open access: yesAdvanced Science, EarlyView.
Multimodal biosensing meets multidomain AI. Wearable biosensors capture complementary biochemical and physiological signals, while cross‐device, population‐aware learning aligns noisy, heterogeneous streams. This Review distills key sensing modalities, fusion and calibration strategies, and privacy‐preserving deployment pathways that transform ...
Chenshu Liu   +10 more
wiley   +1 more source

Physical Unclonable Function (PUF)-Based e-Cash Transaction Protocol (PUF-Cash)

open access: yesCryptography, 2019
Electronic money (e-money or e-Cash) is the digital representation of physical banknotes augmented by added use cases of online and remote payments. This paper presents a novel, anonymous e-money transaction protocol, built based on physical unclonable ...
Jeff Calhoun   +5 more
doaj   +1 more source

Synergistic Pyro‐Phototronics and Structural Anisotropy in CsAg2I3/GaN Heterostructures for High‐Performance Polarization‐Sensitive UV Photodetectors

open access: yesAdvanced Science, EarlyView.
The development of polarization‐sensitive ultraviolet photodetectors is limited by poor heterojunction quality and low polarization sensitivity. This study integrates synthesized CsAg2I3 single crystals with intrinsic non‐centrosymmetry into van der Waals heterojunction devices, demonstrating pronounced pyro‐phototronic effect.
Yalin Zhai   +9 more
wiley   +1 more source

Sequential rationality in cryptographic protocols [PDF]

open access: yesACM Transactions on Economics and Computation, 2010
Much of the literature on rational cryptography focuses on analyzing the strategic properties of cryptographic protocols. However, due to the presence of computationally-bounded players and the asymptotic nature of cryptographic security, a definition of sequential rationality for this setting has thus far eluded researchers.We propose a new framework ...
Gradwohl, Ronen   +2 more
openaire   +2 more sources

Structure and Spectroscopic Characterisation of Phenanthroline‐Based Iodobismuthate(III) Complexes Utilised for Raw Acoustic Signal Classification

open access: yesAdvanced Intelligent Discovery, EarlyView.
Memristors based on trimethylsulfonium (phenanthroline)tetraiodobismuthate have been utilised as a nonlinear node in a delayed feedback reservoir. This system allowed an efficient classification of acoustic signals, namely differentiation of vocalisation of the brushtail possum (Trichosurus vulpecula).
Ewelina Cechosz   +4 more
wiley   +1 more source

AI‐Assisted IoT‐Enabled ECG Monitoring: Integrating Foundational and Generative AI Tools for Sustainable Smart Healthcare—Recent Trends

open access: yesAI &Innovation, EarlyView.
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury   +2 more
wiley   +1 more source

A new non-commutative key exchange protocol on combinatorial semigroup

open access: yesAutomatika
Since the launch of the post-quantum cryptography standardization project by NIST, post-quantum cryptography has become a prominent research area. Non-commutative cryptography constructed using NP-complete problems is widely regarded resistant to quantum
Jing Zhang, Ya-Juan Yang, JingJing Bao
doaj   +1 more source

Home - About - Disclaimer - Privacy