Results 81 to 90 of about 230,478 (367)
Homomorphic Encryption of Supervisory Control Systems Using Automata
Cyber-physical systems have been highly integrated into many contemporary infrastructures. As this integration deepens, the importance of protecting these systems from unauthorized access and data corruption increases.
Sian Zhou+5 more
doaj +1 more source
Ultralong room temperature phosphorescence is achieved from amorphous organic materials toward information encryption. Ultralong room temperature phosphorescence (URTP) emitted from pure amorphous organic molecules is very rare.
Yan Su+9 more
semanticscholar +1 more source
The NlpC_P60 superfamily of peptidases is recognised by its key role in bacterial cell wall homeostasis. Recently, studies have also described the involvement of NlpC_P60‐like enzymes in bacterial competitive mechanisms and pathogenesis across several lineages.
Catharina dos Santos Silva+1 more
wiley +1 more source
Security Challenges in Smart-Grid Metering and Control Systems [PDF]
The smart grid is a next-generation power system that is increasingly attracting the attention of government, industry, and academia. It is an upgraded electricity network that depends on two-way digital communications between supplier and consumer that ...
Xinxin Fan, Guang Gong
doaj
Quantum states cannot be cloned. I show how to extend this property to classical messages encoded using quantum states, a task I call ``uncloneable encryption.'' An uncloneable encryption scheme has the property that an eavesdropper Eve not only cannot read the encrypted message, but she cannot copy it down for later decoding.
openaire +2 more sources
Making tau amyloid models in vitro: a crucial and underestimated challenge
This review highlights the challenges of producing in vitro amyloid assemblies of the tau protein. We review how accurately the existing protocols mimic tau deposits found in the brain of patients affected with tauopathies. We discuss the important properties that should be considered when forming amyloids and the benchmarks that should be used to ...
Julien Broc, Clara Piersson, Yann Fichou
wiley +1 more source
Low-Complexity Versatile Finite Field Multiplier in Normal Basis
A low-complexity VLSI array of versatile multiplier in normal basis over is presented. The finite field parameters can be changed according to the user′s requirement and make the multiplier reusable in different applications.
Zhang Chang Nian, Li Hua
doaj +1 more source
Designing Secure Heterogeneous Multicore Systems from Untrusted Components
In current systems-on-chip (SoCs) designs, processing elements, i.e., intellectual property (IP) cores, may come from different providers, and executable code may have varying levels of trust, all executing on the same compute platform and sharing ...
Michel A. Kinsy+3 more
doaj +1 more source
A political, performative and affective landscape is revealed in this chapter as a way of approaching the topic of performing the digital: from the macro of the upheaval caused by Edward Snowden’s revelations of mass data surveillance to the micro of a phenomenological account of a crisis following an artistic performance using mobile media ...
openaire +1 more source
On Compressing Encrypted Data without the Encryption Key [PDF]
When it is desired to transmit redundant data over an insecure and bandwidth-constrained channel, it is customary to first compress the redundant data and then encrypt it for security reasons. In this paper, we investigate the novelty of reversing the order of these steps, i.e. first encrypting and then compressing.
Johnson, Mark+2 more
openaire +3 more sources