Results 91 to 100 of about 1,275,223 (320)
Advancements in detecting Deepfakes: AI algorithms and future prospects − a review
The rise of Deepfake technology in the information age provided significant challenges in ensuring the reliability and authenticity of digital media content.
Laishram Hemanta Singh+2 more
doaj +1 more source
Carbon Nanotube 3D Integrated Circuits: From Design to Applications
As Moore's law approaches its physical limits, carbon nanotube (CNT) 3D integrated circuits (ICs) emerge as a promising alternative due to the miniaturization, high mobility, and low power consumption. CNT 3D ICs in optoelectronics, memory, and monolithic ICs are reviewed while addressing challenges in fabrication, design, and integration.
Han‐Yang Liu+3 more
wiley +1 more source
Alternative security architecture for IP Telephony based on digital watermarking [PDF]
Problems with securing IP Telephony systems, insufficient standardization and lack of security mechanisms emerged the need for new approaches and solutions. In this paper a new, alternative security architecture for voice-systems is presented. It is based on digital watermarking: a new, flexible and powerful technology that is increasingly gaining more
arxiv
Digital and Mobile Security for Mexican Journalists and Bloggers [PDF]
A new survey of 102 journalists and bloggers in 20 Mexican states shows nearly 70 percent have been threatened or have suffered attacks because of their work. In addition, 96 percent say they know of colleagues who have been attacked.
Jorge Luis Sierra
core
Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Several signcryption schemes are proposed throughout the years, each of them having
Beheshti, A. A., Toorani, M.
core +2 more sources
Geometric multi‐bit patterning based on dynamic wetting and dewetting phenomena creates roulette‐like Physical Unclonable Function (PUF) labels with stochastic yet deterministic properties. This method leverages the solutal‐Marangoni effect for high randomness while achieving deterministic multinary patterns through polygonal confinement of binary ...
Yeongin Cho+8 more
wiley +1 more source
In this paper, we propose hybrid consensus algorithms that combine machine learning (ML) techniques to address the challenges and vulnerabilities in blockchain networks.
K. Venkatesan, Syarifah Bahiyah Rahayu
doaj +1 more source
DigiLock: User-controlled and Server-aware Digital Locker System [PDF]
The growing popularity of digital systems have paved the way for digital locker that ensures security and safety of the digital documents in store. While facilitating this system to user and availing its services offered by service provider, non-repudiation of service offered and service consumed is an important security requirement in the digital ...
arxiv
This study demonstrates the use of a low‐cost 3D printing technique to prepare a large‐area PVDF‐FAPbI3 composite dielectric film for flexible TENG application. The δ→α phase transformation of the FAPbI3 nanofillers has significantly improved the β‐phase content, morphology, and dielectric properties of the PVDF film.
Nurfatin Hafizah Zain Karimy+7 more
wiley +1 more source
Digital security vulnerabilities and threats implications for financial institutions deploying digital technology platforms and application: FMEA and FTOPSIS analysis. [PDF]
Edu AS, Agoyi M, Agozie D.
europepmc +1 more source