Results 51 to 60 of about 1,362,310 (293)

Permutation-Based Hash Chains with Application to Password Hashing

open access: yesIACR Transactions on Symmetric Cryptology
Hash chain based password systems are a useful way to guarantee authentication with one-time passwords. The core idea dates back to Lamport, and is specified in RFC 1760 as S/Key. At CCS 2017, Kogan et al.
Charlotte Lefevre, Bart Mennink
doaj   +1 more source

A One-Dimensional Convolutional Neural Network (1D-CNN) Based Deep Learning System for Network Intrusion Detection

open access: yesApplied Sciences, 2022
The connectivity of devices through the internet plays a remarkable role in our daily lives. Many network-based applications are utilized in different domains, e.g., health care, smart environments, and businesses.
Emad Ul Haq Qazi   +2 more
doaj   +1 more source

3D (Bio) Printing Combined Fiber Fabrication Methods for Tissue Engineering Applications: Possibilities and Limitations

open access: yesAdvanced Functional Materials, EarlyView.
Biofabrication aims at providing innovative technologies and tools for the fabrication of tissue‐like constructs for tissue engineering and regenerative medicine applications. By integrating multiple biofabrication technologies, such as 3D (bio) printing with fiber fabrication methods, it would be more realistic to reconstruct native tissue's ...
Waseem Kitana   +2 more
wiley   +1 more source

Deep Learning-Based Digital Image Forgery Detection System

open access: yesApplied Sciences, 2022
The advancements of technology in every aspect of the current age are leading to the misuse of data. Researchers, therefore, face the challenging task of identifying these manipulated forms of data and distinguishing the real data from the manipulated ...
Emad Ul Haq Qazi   +2 more
doaj   +1 more source

A Contribution to Secure the Routing Protocol "Greedy Perimeter Stateless Routing" Using a Symmetric Signature-Based AES and MD5 Hash

open access: yes, 2011
This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ...
Erritali, Mohammed   +2 more
core   +1 more source

All‐in‐One Analog AI Hardware: On‐Chip Training and Inference with Conductive‐Metal‐Oxide/HfOx ReRAM Devices

open access: yesAdvanced Functional Materials, EarlyView.
An all‐in‐one analog AI accelerator is presented, enabling on‐chip training, weight retention, and long‐term inference acceleration. It leverages a BEOL‐integrated CMO/HfOx ReRAM array with low‐voltage operation (<1.5 V), multi‐bit capability over 32 states, low programming noise (10 nS), and near‐ideal weight transfer.
Donato Francesco Falcone   +11 more
wiley   +1 more source

Permutation-Based Hashing Beyond the Birthday Bound

open access: yesIACR Transactions on Symmetric Cryptology
It is known that the sponge construction is tightly indifferentiable from a random oracle up to around 2c/2 queries, where c is the capacity. In particular, it cannot provide generic security better than half of the underlying permutation size.
Charlotte Lefevre, Bart Mennink
doaj   +1 more source

In Situ Study of Resistive Switching in a Nitride‐Based Memristive Device

open access: yesAdvanced Functional Materials, EarlyView.
In situ TEM biasing experiment demonstrates the volatile I‐V characteristic of MIM lamella device. In situ STEM‐EELS Ti L2/L3 ratio maps provide direct evidence of the oxygen vacancies migrations under positive/negative electrical bias, which is critical for revealing the RS mechanism for the MIM lamella device.
Di Zhang   +19 more
wiley   +1 more source

Spatially Tailorable Liquid Crystalline Elastomer Alignment During Digital Light Process 3D Printing

open access: yesAdvanced Functional Materials, EarlyView.
Here, we report the fabrication of 3D printable liquid crystalline elastomer (LCE) structures with spatially tailorable alignment domains within the same layer. This work addresses the long‐standing challenge of preparing complex 3D LCE architectures with patterned functional domains to achieve nonlinear deformations. Fabrication of multi‐domains in 3D
Adam Bischoff   +8 more
wiley   +1 more source

Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve

open access: yes, 2008
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Several signcryption schemes are proposed throughout the years, each of them having
Beheshti, A. A., Toorani, M.
core   +2 more sources

Home - About - Disclaimer - Privacy