Results 61 to 70 of about 120,057 (278)

Efficient Multi-Key FHE With Short Extended Ciphertexts and Directed Decryption Protocol

open access: yesIEEE Access, 2019
Multi-key full homomorphic encryption (MKFHE) can perform arbitrary operations on encrypted data under different public keys (users), and the final ciphertext can be jointly decrypted by all involved users.
Ningbo Li   +5 more
doaj   +1 more source

Adaptive authentication and key agreement mechanism for future cellular systems [PDF]

open access: yes, 2006
Since the radio medium can be accessed by anyone, authentication of users is a very important element of a mobile network. Nowadays, in GSM/GPRS a challenge response protocol is used to authenticate the user to the mobile network.
Dimitriou, T., Komninos, N.
core  

Network Security And Cryptography

open access: yes, 2018
With the advent of the World Wide Web and the emergence of e -commerce applications and social networks, organizations across the world generate a large amount of data daily. Data security is the utmost critical issue in ensuring safe transmission of information through the internet. Also network security issues are now becoming important as society is
Akshay P. Kale1, Kranti Shrikhande
openaire   +1 more source

Artifact‐Minimizing Ultrathin Transparent Electrodes Fabricated via iCVD for In Vivo Optogenetic Stimulation and Neural Signal Monitoring of Primary Visual Cortex

open access: yesAdvanced Functional Materials, EarlyView.
We present ultrathin flexible transparent electrodes through iCVD‐enabled molecular control of 10 nm gold films on poly(dimethylaminomethylstyrene). In vivo validation demonstrated photoelectric artifact reduction vs. opaque electrodes and preservation of natural neural dynamics.
Tae Jin Mun   +11 more
wiley   +1 more source

Meniscus Pixel Printing for Contact‐Lens Vision Sensing and Robotic Control

open access: yesAdvanced Functional Materials, EarlyView.
A visual‐sensing contact lens is enabled by meniscus pixel printing (MPP), which rapidly patterns a 200 µm perovskite photodetector pixel in 1 s without masks, vacuum processing, or bulky equipment. A deep‐learning‐based super‐resolution reconstructs sparse on‐lens signals into 80 × 80 high‐resolution visual information, while AI‐driven eye‐tracking ...
Byung‐Hoon Gong   +7 more
wiley   +1 more source

Integer wavelet transform‐based secret image sharing using rook polynomial and hamming code with authentication

open access: yesCAAI Transactions on Intelligence Technology
As an effective way to securely transfer secret images, secret image sharing (SIS) has been a noteworthy area of research. Basically in a SIS scheme, a secret image is shared via shadows and could be reconstructed by having the required number of them. A
Sara Charoghchi   +2 more
doaj   +1 more source

Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations [PDF]

open access: yes, 2018
Ideas from Fourier analysis have been used in cryptography for the last three decades. Akavia, Goldwasser and Safra unified some of these ideas to give a complete algorithm that finds significant Fourier coefficients of functions on any finite abelian ...
Galbraith, Steven D.   +2 more
core   +1 more source

Halide‐Dependent Photoluminescence and Heavy‐Atom Effects in Low‐Melting Organic–Inorganic Manganese Halides

open access: yesAdvanced Functional Materials, EarlyView.
Two pyridinium‐based ionic liquid templated hybrid manganese halides, (C4Py)2[MnCl4] and (C4Py)2[MnBr4], display similar bulk structures but show significantly different photoluminescence behaviors due to the bromine heavy‐atom effect. Their stable local Mn environments remain intact even in the molten state, allowing applications such as luminescence ...
Biswajit Bhattacharyya   +22 more
wiley   +1 more source

Pembuatan Perangkat Lunak Media Pembelajaran Kriptografi Klasik [PDF]

open access: yes, 2010
The development of the technology has making it as one of the main media of information changing. Not all the information is open for public. Because internet is a public-computer-network, then it needed an effort to keep the security of that information.
Hallim, Abd.   +2 more
core  

Robust Polymer Hydrogels Improve Electric‐Fish‐Inspired Batteries

open access: yesAdvanced Functional Materials, EarlyView.
ABSTRACT Electric‐fish‐inspired hydrogel batteries based on ion‐concentration gradients offer an attractive route to soft power sources; however, the poor mechanical properties of existing hydrogels limit device assembly and performance. Here, we report poly(ethylene glycol) methyl ether acrylate hydrogels that enable ion‐gradient batteries composed of
Nick Zahnd   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy