Results 81 to 90 of about 1,362,310 (293)
Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information
Side-channel countermeasure designers often face severe performance overheads when trying to protect a device. Widely applied countermeasures such as masking and shuffling entail generating a large amount of random numbers, which can result in a ...
Kostas Papagiannopoulos
doaj +1 more source
ELECTRONIC COMMERCE SECURITY IN THE CONTEXT OF THE MEANS OF PAYMENT DEMATERIALIZATION [PDF]
Some items regarding electronic commerce, electronic vulnerabilities, electronic means of payment, digital money and electronic micropayments are presented below.
Alexandru Pîrjan
core
Applications of tripled chaotic maps in cryptography
Security of information has become a major issue during the last decades. New algorithms based on chaotic maps were suggested for protection of different types of multimedia data, especially digital images and videos in this period. However, many of them
A. Akhavan +48 more
core +1 more source
This study introduces a novel chloro boron subphthalocyanine/polymer blend OFET sensor achieving 0.005 ppb limit of detection for ammonia at room temperature and high selectivity against similar amines. An original theoretical framework is proposed to describe the sensing mechanism, relating analyte molecular volume and Lewis basicity to sensor ...
Kavinraaj Ella Elangovan +6 more
wiley +1 more source
Advancements in detecting Deepfakes: AI algorithms and future prospects − a review
The rise of Deepfake technology in the information age provided significant challenges in ensuring the reliability and authenticity of digital media content.
Laishram Hemanta Singh +2 more
doaj +1 more source
MAGTWIST: A compact magnetic rotary actuator, enabling smooth, stepless rotation, and on‐demand locking. Inspired by peristalsis, a soft polymer belt generates a traveling‐wave, enabling 270° rotation when heated. Cooling stiffens the belt, locking it in position and enabling it to withstand high loads.
Simon Frieler +3 more
wiley +1 more source
Tailored thermo‐mechanical properties of shape memory polymer composites enable large reversible deformation as well as high actuation speed. Moreover, a structural design with curvature in the transverse direction achieves sub‐second actuation on heating and a larger recovery ratio on cooling. Finally, these newly developed smart two‐way actuators can
Dajeong Kang +6 more
wiley +1 more source
In this paper, we propose hybrid consensus algorithms that combine machine learning (ML) techniques to address the challenges and vulnerabilities in blockchain networks.
K. Venkatesan, Syarifah Bahiyah Rahayu
doaj +1 more source
Commitment Schemes from OWFs with Applications to Quantum Oblivious Transfer
Commitment schemes (CSs) are essential to many cryptographic protocols and schemes with applications that include privacy-preserving computation on data, privacy-preserving authentication, and, in particular, oblivious transfer protocols.
Thomas Lorünser +2 more
doaj +1 more source
The Capacity of the Malaysian Legal System to Commit Digital Crimes [PDF]
Developments in information and communication technology have had a significant impact on individuals and society as a whole. Digitalization has changed the way of action and interaction in social contexts.
Peyman Namamian
doaj +1 more source

