Results 71 to 80 of about 120,057 (278)

Homomorphic encryption location privacy-preserving scheme based on Markov model

open access: yes网络与信息安全学报, 2017
Homomorphic encryption location privacy-preserving scheme based on Markov mode was proposed to solve the problem of location privacy and query privacy protection in location-based service systems.
Kai ZHOU,Jian-qiong HE   +2 more
doaj   +1 more source

Metachromatic Butterfly Bile Pigments for Multi‐Level Optical Security Films

open access: yesAdvanced Functional Materials, EarlyView.
Bio‐derived optical security materials are manufactured by embedding butterfly‐based pigments in polymer films. Tunable color and fluorescence responses arise from concentration‐controlled metachromasy, enabling spatially encoded patterns with distinct visible, UV‐active, and spectral signatures.
Limin Wang, Bodo D. Wilts
wiley   +1 more source

Computational Soundness of Formal Encryption in Coq [PDF]

open access: yes, 2007
We formalize Abadi and Rogaway's computational soundness result in the Coq interactive theorem prover. This requires to model notions of provable cryptography like indistinguishability between ensembles of probability distributions, PPT reductions, and ...
Corin, R.J.
core   +2 more sources

Unlocking Photodetection Mode Switching from a Simple Lateral Design

open access: yesAdvanced Functional Materials, EarlyView.
A simple lateral 2D perovskite photodetector capable of switching among transient, continuous, and dual transient/continuous photoresponse modes is achieved by integrating photoconductive effects with capacitive coupling from the SiO2/Si substrate. Such light‐programmable photodetection mode switching enables triple‐channel information transmission and
Zijun (June) Yong   +10 more
wiley   +1 more source

Non-existence, radial symmetry, monotonicity, and Liouville theorem of master equations with fractional p-Laplacian

open access: yesAdvances in Nonlinear Analysis
In this article, first, we introduce a new operator (∂t−Δp)su(z,t)=Cn,sp∫−∞t∫Rn∣u(z,t)−u(ζ,ϱ)∣p−2(u(z,t)−u(ζ,ϱ))(t−ϱ)n2+1+sp2e−∣z−ζ∣24(t−ϱ)dζdϱ,{\left({\partial }_{t}-{\Delta }_{p})}^{s}u\left(z,t)={C}_{n,sp}\underset{-\infty }{\overset{t}{\int }}\mathop{
Liu Mengru, Zhang Lihong
doaj   +1 more source

General secure encryption algorithm for separable reversible data hiding in encrypted domain

open access: yesJournal of King Saud University: Computer and Information Sciences
The separable reversible data hiding in encrypted domain (RDH-ED) algorithm leaves out the embedding space for the information before or after encryption and makes the operation of extracting the information and restoring the image not interfere with ...
Hongli Wan   +4 more
doaj   +1 more source

Coagulative Granular Hydrogels with an Enzyme Catalyzed Fibrin Network for Endogenous Tissue Regeneration

open access: yesAdvanced Healthcare Materials, EarlyView.
Coagulative granular hydrogels are composed of packed thrombin‐functionalized microgels that catalyze the conversion of fibrinogen into a secondary fibrin network, filling the interstitial voids. This bio‐inspired approach stabilizes the biomaterial to match the robustness of bulk hydrogels without compromising injectability, mimicking the initial ...
Zhipeng Deng   +16 more
wiley   +1 more source

Hopf's lemma, asymptotic radial symmetry, and monotonicity of solutions to the logarithmic Laplacian parabolic system

open access: yesAdvances in Nonlinear Analysis
In this article, we extend the asymptotic method of moving planes to the following logarithmic Laplacian parabolic system: ∂z∂t(η,t)+(−△)ℒz(η,t)=f(t,v(η,t)),(η,t)∈B1(0)×[0,∞),∂v∂t(η,t)+(−△)ℒv(η,t)=g(t,z(η,t)),(η,t)∈B1(0)×[0,∞),z(η,t)=0,v(η,t)=0,(η,t)∈B1c(
Wang Guotao, Wang Jing
doaj   +1 more source

A Modular Bioinstructive Platform Reveals Mechanistic Insights into Additive‐Free, Topography‐Driven Osteogenesis

open access: yesAdvanced Healthcare Materials, EarlyView.
Engineered microparticle topographies direct human mesenchymal stem cell osteogenesis without biochemical additives. This osteogenic commitment is driven by canonical Hedgehog signaling and followed by temporal IGF‐II engagement. Two‐photon polymerization demonstrates spatial control, enabling the engineering of topographical gradients that pattern ...
Fatmah I. Ghuloum   +5 more
wiley   +1 more source

An Effective Parameter Analysis for Sending-or-Not-Sending Quantum Key Distribution with Untrusted Light Sources

open access: yesEntropy
The twin-field (TF) protocol is a key protocol in quantum key distribution (QKD) that enables remote key distribution, achieving a maximum secure transmission distance of over 500 km.
Jiajian Huang, Weigang Li, Yucheng Qiao
doaj   +1 more source

Home - About - Disclaimer - Privacy