A CMOS‐compatible flash memory structure with multi‐level programming produces reliable and reproducible physically unclonable functions (PUFs) for secure IoT applications. Device‐specific variations in flat‐band voltage enable scalable key generation without standby power.
Kyumin Sim +6 more
wiley +1 more source
This study introduces a fusion filtering‐based method to accurately extract spectral trajectories of non‐repetitive transient weak signals in industrial control networks, enhancing signal clarity and reliability across multiple frequency bands. ABSTRACT In response to the problem of difficulty in accurately extracting spectral trajectories of multi ...
Changzhong Gao +4 more
wiley +1 more source
A chaotic parallel hash engine with dynamic stochastic diffusion for blockchain and cloud security. [PDF]
Wang Q +5 more
europepmc +1 more source
ShockHash: Near Optimal-Space Minimal Perfect Hashing Beyond Brute-Force. [PDF]
Lehmann HP, Sanders P, Walzer S.
europepmc +1 more source
HashWave: blockchain-powered perceptual hashing for resilient audio piracy detection against signal-processing attacks in decentralized networks. [PDF]
Pandey S +3 more
europepmc +1 more source
An efficient image encryption scheme based on Lorenz system and quantum-inspired walks. [PDF]
Karmany M +4 more
europepmc +1 more source
Resilient cybersecurity in smart grid ICS communication using BLAKE3-driven dynamic key rotation and intrusion detection. [PDF]
Dokku NS +5 more
europepmc +1 more source
Anonymous and Efficient Chaotic Map-Based Authentication Protocol for Industrial Internet of Things. [PDF]
Zeng D +6 more
europepmc +1 more source
Semantic decentralized authentication for IoT-based e-learning using Hedera Hashgraph and Knowledge Graphs. [PDF]
Luo L, Zhang Y, Tang Q.
europepmc +1 more source
Securing e-governance against shadow attacks with blockchain technology. [PDF]
Mishra P, R G.
europepmc +1 more source

