Results 31 to 40 of about 6,594 (201)
Self‐Assembled Physical Unclonable Function Labels Based on Plasmonic Coupling
This article introduces advanced anti‐counterfeit labels crafted through DNA‐guided self‐assembly of plasmonic nanoparticles. Utilizing nanosphere lithography for dense and precise nanoparticle placement, these labels feature unique, unclonable optical signatures achieved through plasmonic coupling, detectable by an economical 3D‐printed dark field ...
Mihir Dass+9 more
wiley +1 more source
LoET-E: A Refined Theory for Proving Security Properties of Cryptographic Protocols
Nowadays, more and more new cryptographic protocols are emerging, and the security analysis of emerging cryptographic protocols is increasingly important.
Jiawen Song+4 more
doaj +1 more source
Optical Chaos Generation and Applications
This review comprehensively examines optical chaos generation via feedback, injection, and optoelectronic methods, emphasizing bandwidth enhancement and time‐delay suppression. Applications include chaos‐synchronized secure communication, physical random number generation, chaotic lidar for cm‐level detection, distributed fiber sensing, and terahertz ...
Wenhui Chen+8 more
wiley +1 more source
Blockchain‐Empowered H‐CPS Architecture for Smart Agriculture
This article reviews the current system architectures for smart agriculture and proposes a blockchain‐empowered hierarchical cyber‐physical system (H‐CPS) framework. It discusses the challenges and outlines future research directions, including the use of semantic blockchain to handle complex data and models.
Xiaoding Wang+8 more
wiley +1 more source
This study introduces a novel probabilistic bit (p‐bit) device utilizing advanced materials, hexagonal boron nitride (h‐BN) and tin disulfide (SnS2), to enhance durability and energy efficiency in computational applications. By leveraging the stochastic behavior of electron trapping and detrapping at the h‐BN/SnS2 interface, the device achieves ...
Joon‐Kyu Han+5 more
wiley +1 more source
A Secure User Authentication Protocol for Heterogeneous Mobile Environments
Mobile devices have become very important for our daily needs. The user authentication protocols with the key agreement are required to deal with the security issues that arise from the use of mobile devices through Internet applications.
Alzubair Hassan+7 more
doaj +1 more source
With the development of artificial intelligence and big data, hardware encryption has emerged as a key technology for secure communication. This study developed an HfAlOx‐based memristor with eight distinguishable resistance states, and realized novel neuromorphic hardware encryption.
Bo Sun+6 more
wiley +1 more source
Agile and Versatile Quantum Communication: Signatures and Secrets
Agile cryptography allows for a resource-efficient swap of a cryptographic core in case the security of an underlying classical cryptographic algorithm becomes compromised.
Stefan Richter+9 more
doaj +1 more source
Statistical Complexity of Quantum Learning
The statistical performance of quantum learning is investigated as a function of the number of training data N$N$, and of the number of copies available for each quantum state in the training and testing data sets, respectively S$S$ and V$V$. Indeed, the biggest difference in quantum learning comes from the destructive nature of quantum measurements ...
Leonardo Banchi+3 more
wiley +1 more source
On the cryptographic properties of “Limonnik-3” AKE scheme
We study the “Limonnik-3” authenticated key exchange protocol which is a part of Standardization recommendations R 1323565.1.004-2017 “Authenticated key agreement schemes based on public keys”, officially adopted in Russia in 2017, alongside with the ...
Sergey V. Grebnev
doaj +1 more source