Results 101 to 110 of about 60,215 (284)
Encrypting Images Using the Sum of Functions of a Real Variable
A combined cryptosystem with symmetric keys for encrypting messages is proposed. Its unique feature is the use of functions of a real variable as keys instead of natural numbers.
Viktor V. Avramenko +4 more
doaj +1 more source
Laser‐Assisted Processing and Modification of Bioactive Glasses: A Review
Laser technologies provide powerful tools to process and transform bioactive glasses for advanced biomedical applications. This review discusses laser‐matter interaction mechanisms, laser surface engineering, and laser‐assisted fabrication of scaffolds and nanofibers.
Antonio Riveiro +8 more
wiley +1 more source
A HYBRID ELLIPTIC CURVE AND DATA ENCRYPTION STANDARD ALGORITHM FOR SECURE DATA COMMUNICATION
n the rapidly evolving landscape of digital communication, ensuring data security remains a paramount concern. This research proposes a hybrid encryption technique that combines the strengths of Elliptic Curve Cryptography (ECC) and the Data Encryption ...
Samuel N. John +5 more
doaj
Implantable optoelectrical devices are an effective resource for the modulation and monitoring of neural activity with high spatiotemporal resolution. This review discusses current challenges faced by these devices and outlines future perspectives for the development of next‐generation neural interfaces targeting chronic, multisite, and multimodal ...
Stella Aslanoglou +4 more
wiley +1 more source
Decrypting the chaperone code [PDF]
Andrew W. Truman +2 more
openaire +2 more sources
Engineered microparticle topographies direct human mesenchymal stem cell osteogenesis without biochemical additives. This osteogenic commitment is driven by canonical Hedgehog signaling and followed by temporal IGF‐II engagement. Two‐photon polymerization demonstrates spatial control, enabling the engineering of topographical gradients that pattern ...
Fatmah I. Ghuloum +5 more
wiley +1 more source
Secure communication in the digital age: a new paradigm with graph-based encryption algorithms
In the contemporary technological landscape, ensuring confidentiality is a paramount concern addressed through various skillsets. Cryptography stands out as a scientific methodology for safeguarding communication against unauthorized access.
Nasir Ali +7 more
doaj +1 more source
This review highlights recent advances in smart face masks that actively monitor breathing. By integrating humidity, gas, temperature, pressure, strain, and triboelectric sensors, these masks track key respiratory parameters in real time. The article summarizes sensor mechanisms, compares performance across studies, and discusses challenges and future ...
Negin Faramarzi +7 more
wiley +1 more source
Bioengineered 3D hPSC‐Cholangiocyte Ducts With Physiological Signals for Biliary Disease Modeling
Tian and colleagues generated a bioengineered bile duct from human pluripotent stem cell (hPSC)‐derived intrahepatic cholangiocytes within a high‐throughput, 384‐well platform to systematically examine the influence of biliary physiological signals including fluid flow, stromal cells and bile acids, and models intrahepatic biliary disease progression ...
Britney Tian +10 more
wiley +1 more source
Making Decryption Accountable [PDF]
Decryption is accountable if the users that create ciphertexts can gain information about the circumstances of the decryptions that are later obtained. We describe a protocol that forces decryptors to create such information. The information can’t be discarded or suppressed without detection. The protocol relies on a trusted hardware device.
openaire +1 more source

