Results 71 to 80 of about 16,532 (241)
In nuclear power plants, efficiently managing sensitive data and ensuring secure transmission between nodes and storage systems are critical for maintaining operational integrity and safety. This paper proposes a novel approach utilizing dual on-premises
Niayesh Gharaei
doaj +1 more source
In this study, the preparation techniques for silver‐based gas diffusion electrodes used for the electrochemical reduction of carbon dioxide (eCO2R) are systematically reviewed and compared with respect to their scalability. In addition, physics‐based and data‐driven modeling approaches are discussed, and a perspective is given on how modeling can aid ...
Simon Emken +6 more
wiley +1 more source
Design of Rabin-like cryptosystem without decryption failure [PDF]
In this work, we design a new, efficient and practical Rabin-like cryptosystem without using the Jacobi symbol, redundancy in the message and avoiding the demands of extra information for finding the correct plaintext.
Asbullah, Muhammad Asyraf +1 more
core
A pixelation‐free, monolithic iontronic pressure sensor enables simultaneous pressure and position sensing over large areas. AC‐driven ion release generates spatially varying impedance pathways depending on the pressure. Machine learning algorithms effectively decouple overlapping pressure–position signals from the multichannel outputs, achieving high ...
Juhui Kim +10 more
wiley +1 more source
Multiple time servers timed-release encryption based on Shamir secret sharing for EHR cloud system
Electronic health record (EHR) cloud system, as a primary tool driving the informatization of medical data, have positively impacted both doctors and patients by providing accurate and complete patient information.
Ke Yuan +6 more
doaj +1 more source
Circumventing Authority: Loopholes in the DMCA’s Access Controls [PDF]
In a world where digital pirates freely roam the internet, seemingly plundering at will, the providers of digital content must find a way to protect their valuable assets. Digital fences afford that protection--but not very well. Fortunately (for content
Rucker, Adam L.
core +1 more source
We developed a micro‐sized, biocompatible implant for postoperative sustained delivery of anti‐fibrotic antibodies in glaucoma surgery. Machine learning‐guided optimization of polymer composition, implant geometry, and porosity enabled precise control of drug release.
Mengqi Qin +5 more
wiley +1 more source
The Hamming Quasi-Cyclic (HQC) key encapsulation mechanism (KEM), recently selected by NIST for standardization in the Post-Quantum Cryptography (PQC) process, distinguishes itself through its efficiency, robust design based on hard decoding problems in
Haiyue Dong, Qian Guo
doaj +1 more source
Adaptive authentication and key agreement mechanism for future cellular systems [PDF]
Since the radio medium can be accessed by anyone, authentication of users is a very important element of a mobile network. Nowadays, in GSM/GPRS a challenge response protocol is used to authenticate the user to the mobile network.
Dimitriou, T., Komninos, N.
core
This work presents ARC‐3D, a soft 3D model that recreates how brain support cells, called astrocytes, react to oxidative stress. The system visualizes rapid calcium changes and inflammatory signals, and shows how the drug KDS12025 can protect cells from damage. ARC‐3D offers a simple, reliable way to study early drivers of brain inflammation.
Ju‐Kang Kim +6 more
wiley +1 more source

