Results 71 to 80 of about 120,057 (278)
Homomorphic encryption location privacy-preserving scheme based on Markov model
Homomorphic encryption location privacy-preserving scheme based on Markov mode was proposed to solve the problem of location privacy and query privacy protection in location-based service systems.
Kai ZHOU,Jian-qiong HE +2 more
doaj +1 more source
Metachromatic Butterfly Bile Pigments for Multi‐Level Optical Security Films
Bio‐derived optical security materials are manufactured by embedding butterfly‐based pigments in polymer films. Tunable color and fluorescence responses arise from concentration‐controlled metachromasy, enabling spatially encoded patterns with distinct visible, UV‐active, and spectral signatures.
Limin Wang, Bodo D. Wilts
wiley +1 more source
Computational Soundness of Formal Encryption in Coq [PDF]
We formalize Abadi and Rogaway's computational soundness result in the Coq interactive theorem prover. This requires to model notions of provable cryptography like indistinguishability between ensembles of probability distributions, PPT reductions, and ...
Corin, R.J.
core +2 more sources
Unlocking Photodetection Mode Switching from a Simple Lateral Design
A simple lateral 2D perovskite photodetector capable of switching among transient, continuous, and dual transient/continuous photoresponse modes is achieved by integrating photoconductive effects with capacitive coupling from the SiO2/Si substrate. Such light‐programmable photodetection mode switching enables triple‐channel information transmission and
Zijun (June) Yong +10 more
wiley +1 more source
In this article, first, we introduce a new operator (∂t−Δp)su(z,t)=Cn,sp∫−∞t∫Rn∣u(z,t)−u(ζ,ϱ)∣p−2(u(z,t)−u(ζ,ϱ))(t−ϱ)n2+1+sp2e−∣z−ζ∣24(t−ϱ)dζdϱ,{\left({\partial }_{t}-{\Delta }_{p})}^{s}u\left(z,t)={C}_{n,sp}\underset{-\infty }{\overset{t}{\int }}\mathop{
Liu Mengru, Zhang Lihong
doaj +1 more source
General secure encryption algorithm for separable reversible data hiding in encrypted domain
The separable reversible data hiding in encrypted domain (RDH-ED) algorithm leaves out the embedding space for the information before or after encryption and makes the operation of extracting the information and restoring the image not interfere with ...
Hongli Wan +4 more
doaj +1 more source
Coagulative granular hydrogels are composed of packed thrombin‐functionalized microgels that catalyze the conversion of fibrinogen into a secondary fibrin network, filling the interstitial voids. This bio‐inspired approach stabilizes the biomaterial to match the robustness of bulk hydrogels without compromising injectability, mimicking the initial ...
Zhipeng Deng +16 more
wiley +1 more source
In this article, we extend the asymptotic method of moving planes to the following logarithmic Laplacian parabolic system: ∂z∂t(η,t)+(−△)ℒz(η,t)=f(t,v(η,t)),(η,t)∈B1(0)×[0,∞),∂v∂t(η,t)+(−△)ℒv(η,t)=g(t,z(η,t)),(η,t)∈B1(0)×[0,∞),z(η,t)=0,v(η,t)=0,(η,t)∈B1c(
Wang Guotao, Wang Jing
doaj +1 more source
Engineered microparticle topographies direct human mesenchymal stem cell osteogenesis without biochemical additives. This osteogenic commitment is driven by canonical Hedgehog signaling and followed by temporal IGF‐II engagement. Two‐photon polymerization demonstrates spatial control, enabling the engineering of topographical gradients that pattern ...
Fatmah I. Ghuloum +5 more
wiley +1 more source
The twin-field (TF) protocol is a key protocol in quantum key distribution (QKD) that enables remote key distribution, achieving a maximum secure transmission distance of over 500 km.
Jiajian Huang, Weigang Li, Yucheng Qiao
doaj +1 more source

