Results 61 to 70 of about 1,801,560 (284)

Quantum Emitters in Hexagonal Boron Nitride: Principles, Engineering and Applications

open access: yesAdvanced Functional Materials, EarlyView.
Quantum emitters in hexagonal boron nitride have emerged as a promising candidate for quantum information science. This review examines the fundamentals of these quantum emitters, including their level structures, defect engineering, and their possible chemical structures.
Thi Ngoc Anh Mai   +8 more
wiley   +1 more source

Optical Chaos Generation and Applications

open access: yesAdvanced Photonics Research, EarlyView.
This review comprehensively examines optical chaos generation via feedback, injection, and optoelectronic methods, emphasizing bandwidth enhancement and time‐delay suppression. Applications include chaos‐synchronized secure communication, physical random number generation, chaotic lidar for cm‐level detection, distributed fiber sensing, and terahertz ...
Wenhui Chen   +8 more
wiley   +1 more source

Minimum Round Card-Based Cryptographic Protocols Using Private Operations

open access: yesCryptography, 2021
This paper shows new card-based cryptographic protocols with the minimum number of rounds, using private operations under the semi-honest model. Physical cards are used in card-based cryptographic protocols instead of computers to achieve secure ...
Hibiki Ono, Yoshifumi Manabe
doaj   +1 more source

Blockchain‐Empowered H‐CPS Architecture for Smart Agriculture

open access: yesAdvanced Science, EarlyView.
This article reviews the current system architectures for smart agriculture and proposes a blockchain‐empowered hierarchical cyber‐physical system (H‐CPS) framework. It discusses the challenges and outlines future research directions, including the use of semantic blockchain to handle complex data and models.
Xiaoding Wang   +8 more
wiley   +1 more source

Practical Quantum Bit Commitment Protocol Based on Quantum Oblivious Transfer

open access: yesApplied Sciences, 2018
Oblivious transfer (OT) and bit commitment (BC) are two-party cryptographic protocols which play crucial roles in the construction of various cryptographic protocols. We propose three practical quantum cryptographic protocols in this paper.
Yaqi Song, Li Yang
doaj   +1 more source

Cryptographic mechanisms for secure interaction of control and measuring devices

open access: yesБезопасность информационных технологий, 2020
The paper describes the key features of the cryptographic protocol providing secure interaction between control and measuring devices. The hierarchical structure underlying this protocol and the relationship between the transport and session levels of ...
Alexey Yu. Nesterenko   +1 more
doaj   +1 more source

Protocols for symmetric secret key establishment: Modern approach

open access: yesVojnotehnički Glasnik, 2022
Introduction/purpose: The problem of efficient distribution of cryptographic keys in communication systems has existed since its first days and is especially emphasized by the emergence of mass communication systems.
Meiran Galis   +3 more
doaj   +1 more source

Highly durable and energy‐efficient probabilistic bits based on h‐BN/SnS2 interface for integer factorization

open access: yesInfoMat, EarlyView.
This study introduces a novel probabilistic bit (p‐bit) device utilizing advanced materials, hexagonal boron nitride (h‐BN) and tin disulfide (SnS2), to enhance durability and energy efficiency in computational applications. By leveraging the stochastic behavior of electron trapping and detrapping at the h‐BN/SnS2 interface, the device achieves ...
Joon‐Kyu Han   +5 more
wiley   +1 more source

A transport-independent general purpose cryptographic protocol

open access: yesAdaptivni Sistemi Avtomatičnogo Upravlinnâ, 2022
The article considers the problem of the transport-independent cryptographic protocol. We analyze requirements for general purpose cryptographic protocol. An analysis of existing protocols is performed to highlight their drawbacks. A protocol schema and
К. Лесогорський   +1 more
doaj   +1 more source

Abstracting cryptographic protocols with tree automata [PDF]

open access: yesScience of Computer Programming, 1999
AbstractCryptographic protocols have so far been analyzed for the most part by means of testing (which does not yield proofs of secrecy) and theorem proving (costly). We propose a new approach, based on abstract interpretation and using regular tree languages. The abstraction we use seems fine-grained enough to be able to certify some protocols.
David Monniaux, David Monniaux
openaire   +3 more sources

Home - About - Disclaimer - Privacy