Results 91 to 100 of about 4,817 (211)

Photonic Hybrid Integration: Strategies and Promises of Advanced Additive Manufacturing

open access: yesAdvanced Optical Materials, Volume 14, Issue 10, 13 March 2026.
Heterogeneous photonic integration combines wafer bonding, transfer printing, and advanced multi‐photon lithography to realize compact, adaptable photonic systems. This review highlights breakthroughs in hybrid materials, metrology, and 4D printing, revealing how the convergence of traditional and emerging fabrication unlocks scalable, high‐performance
Zhitian Shi   +3 more
wiley   +1 more source

Russian Cryptographic Algorithms in the Identity Management Systems

open access: yesБезопасность информационных технологий, 2011
The subject of the research is to implement Russian cryptographic algorithms in the IdM-systems. The research centers on the study of the claim-based authentication protocols and the existing IdM-systems and on the development of an authentication module
A.V. Dubovitskaya, P. V. Smirnov
doaj  

Generating Dynamic Structures Through Physics‐Based Sampling of Predicted Inter‐Residue Geometries

open access: yesAdvanced Science, Volume 13, Issue 18, 27 March 2026.
While static structure prediction has been revolutionized, modeling protein dynamics remains elusive. trRosettaX2‐Dynamics is presented to address this challenge. This framework leverages a Transformer‐based network to predict inter‐residue geometric constraints, guiding conformation generation via physics‐based iterative sampling. The resulting method
Chenxiao Xiang   +3 more
wiley   +1 more source

Entanglement Distribution in Quantum Networks Via Swapping of Partially Entangled Pure States

open access: yesAnnalen der Physik, Volume 538, Issue 3, March 2026.
The manuscript establishes a unified theoretical framework for entanglement swapping with partially entangled pure states across diverse quantum‐network topologies. By deriving closed‐form expressions for the full output ensembles and success probabilities, we show that successive swapping operations generate a binomially distributed spectrum of ...
Henrique Guerra   +3 more
wiley   +1 more source

Molecular Communication Is the Internet of Brain Missing Key: A Comprehensive Overview of Background Technologies and the Generic Framework

open access: yesEngineering Reports, Volume 8, Issue 3, March 2026.
A novel three‐layer architecture is proposed for cell‐to‐cell communication, integrating molecular, nano‐electronic, and digital components. It enables bio‐integrated applications such as remote emotional touching, consensual telepathy, and autonomous drug delivery. Molecular Communication (MC) is utilized with advanced implants, modulation techniques,
Saeed Banaeian Far   +2 more
wiley   +1 more source

Client Trustworthiness within Internet-banking Application Using Removable Key Carriers

open access: yesБезопасность информационных технологий, 2013
In this paper author describes the possibility of using removable key carriers within Internet-banking systems.
Sergey Sergeevich Agafyin
doaj  

Network Security Empowered Digital Teaching Data Protection Algorithm for Ceramic Technology

open access: yesEngineering Reports, Volume 8, Issue 3, March 2026.
In this paper, a complete algorithm system covering sensitivity identification, feature fusion, encrypted transmission and cultural image protection is established based on the ceramic teaching scene enabled by network security. ABSTRACT The digitalization of ceramic technology teaching generates sensitive multi‐modal data, including personal ...
Yuting Zhu   +3 more
wiley   +1 more source

Tomtit‐Raven Evolutionary Selector‐Reinforced Attention‐Driven: A High‐Performance and Computationally Efficient Cyber Threat Detection Framework for Smart Grids

open access: yesEnergy Science &Engineering, Volume 14, Issue 3, Page 1431-1455, March 2026.
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga   +3 more
wiley   +1 more source

Post-Quantum Key Exchange in TLS 1.3: Further Analysis on Performance of New Cryptographic Standards

open access: yesCryptography
The emergence of quantum computing presents a significant threat to classical cryptographic primitives, particularly those employed in securing internet communications via widely used protocols such as Transport Layer Security (TLS).
Konstantina Souvatzidaki   +1 more
doaj   +1 more source

Efficient Robust Spontaneous Parametric Down‐Conversion via Detuning Modulated Composite Segments Designs

open access: yesLaser &Photonics Reviews, Volume 20, Issue 5, 6 March 2026.
Detuning modulated composite segmentation (DMCS) enables robust spontaneous parametric down‐conversion with sevenfold improved temperature stability compared to conventional designs, opening new possibilities for stable quantum photon sources. ABSTRACT Spontaneous parametric down conversion (SPDC) holds a pivotal role in quantum physics, facilitating ...
Muhammad Erew   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy