Results 61 to 70 of about 334,436 (368)

Terahertz Quantum Cryptography [PDF]

open access: yesIEEE Journal on Selected Areas in Communications, 2020
REVTeX. 14 pages. 5 figures.
Carlo Ottaviani   +6 more
openaire   +6 more sources

Counterfactual Quantum Cryptography

open access: yes, 2008
Quantum cryptography allows one to distribute a secret key between two remote parties using the fundamental principles of quantum mechanics. The well-known established paradigm for the quantum key distribution relies on the actual transmission of signal ...
C. H. Bennett   +5 more
core   +1 more source

A stepwise emergence of evolution in the RNA world

open access: yesFEBS Letters, EarlyView.
How did biological evolution emerge from chemical reactions? This perspective proposes a gradual scenario of self‐organization among RNA molecules, where catalytic feedback on random mixtures plays the central role. Short oligomers cross‐ligate, and self‐assembly enables heritable variations. An event of template‐externalization marks the transition to
Philippe Nghe
wiley   +1 more source

An enhanced state-aware model learning approach for security analysis in lightweight protocol implementations

open access: yesJournal of Cloud Computing: Advances, Systems and Applications
Owing to the emergence and rapid advances of new-generation information and digitalization technologies, the concept of model-driven digital twin has received widespread attentions and is developing vigorously.
Jiaxing Guo   +5 more
doaj   +1 more source

SURVEY AND PROPOSED METHOD TO DETECT ADVERSARIAL EXAMPLES USING AN ADVERSARIAL RETRAINING MODEL

open access: yesTạp chí Khoa học Đại học Đà Lạt
Artificial intelligence (AI) has found applications across various sectors and industries, offering numerous advantages to human beings. One prominent area where AI has made significant contributions is in machine learning models.
Thanh Son Phan   +3 more
doaj   +1 more source

Secure Quantum Key Distribution

open access: yes, 2014
Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography.
Curty, Marcos   +2 more
core   +1 more source

Hiding Data in Images Using Cryptography and Deep Neural Network [PDF]

open access: yesJournal of Artificial Intelligence and Systems, 2019
Steganography is an art of obscuring data inside another quotidian file of similar or varying types. Hiding data has always been of significant importance to digital forensics.
Kartik Sharma   +4 more
semanticscholar   +1 more source

Disruption of SETD3‐mediated histidine‐73 methylation by the BWCFF‐associated β‐actin G74S mutation

open access: yesFEBS Letters, EarlyView.
The β‐actin G74S mutation causes altered interaction of actin with SETD3, reducing histidine‐73 methylation efficiency and forming two distinct actin variants. The variable ratio of these variants across cell types and developmental stages contributes to tissue‐specific phenotypical changes. This imbalance may impair actin dynamics and mechanosensitive
Anja Marquardt   +8 more
wiley   +1 more source

A Cross-Trusted Authority Authentication Protocol for Internet of Vehicles Based on Blockchain

open access: yesIEEE Access, 2023
With the increasing number of vehicles connected to the Internet of Vehicles (IoV), to accommodate the evolving needs and patterns of new vehicles, passengers, and drivers, traditional single Trusted Authority (TA) authentication model may no longer be ...
Qi Xie   +3 more
doaj   +1 more source

A proposal for founding mistrustful quantum cryptography on coin tossing

open access: yes, 2003
A significant branch of classical cryptography deals with the problems which arise when mistrustful parties need to generate, process or exchange information.
A. Kent   +7 more
core   +1 more source

Home - About - Disclaimer - Privacy