Results 41 to 50 of about 36,777 (311)
On Beyond-Birthday-Bound Security: Revisiting the Development of ISO/IEC 9797-1 MACs
ISO/IEC 9797-1 is an international standard for block-cipher-based Message Authentication Code (MAC). The current version ISO/IEC 9797-1:2011 specifies six single-pass CBC-like MAC structures that are capped at the birthday bound security.
Yaobin Shen, Lei Wang
doaj +1 more source
(Poly)Borylated Species as Modern Reactive Groups toward Unusual Synthetic Applications
In this review, we spotlight recent breakthroughs in α‐polyboron‐substituted carbon‐centered intermediates (carbanion, carbocation, radical, and carbene) and polyborylated alkenes. By bridging fundamental reactivity with the application potential of these extraordinary species, we hope this review will serve as a roadmap for harnessing these unique ...
Nadim Eghbarieh +5 more
wiley +2 more sources
Blockchain-enhanced certificateless signature scheme in the standard model
The Internet of Things (IoT), driven by wireless communication and other technologies, is gradually entering our lives and promoting the transformation of society from "informatization" to "intelligence".
Xiaodong Yang +4 more
doaj +1 more source
Arylhydrazines: Convenient Homogeneous Reductants for Scalable Cross‐Coupling
Reductive cross‐couplings enable efficient C–C bond formation but are limited by the heterogeneity of Zn or costly reagents like TDAE. We report arylhydrazines as inexpensive, convenient reductants for Ni‐catalyzed sp2–sp3 coupling of aryl halides and secondary alkyl iodides. Mechanistic studies support hydrazine‐mediated NiII reduction for a NiI/NiIII
Nils Kurig +5 more
wiley +2 more sources
Detection of Geometric Transformations in Copy-Move Forgery of Digital Images [PDF]
Digital Forensics is a branch of forensic science which is related to cyber crime. It basically involves the detection, recovery and investigation of material found in digital devices.
Shandilya, Meenal
core +1 more source
Security Analysis of Conditional Privacy-Preserving Authentication Schemes for VANETs
In order to solve security and privacy-preservation issues in VANETs, a number of conditional privacy-preservation schemes based on certificateless signature (CLS) schemes and certificateless aggregate signature (CLAS) schemes have been proposed. However,
Kyung-Ah Shim
doaj +1 more source
This study investigates electromechanical PUFs that improve on traditional electric PUFs. The electron transport materials are coated randomly through selective ligand exchange. It produces multiple keys and a key with motion dependent on percolation and strain, and approaches almost ideal inter‐ and intra‐hamming distances.
Seungshin Lim +7 more
wiley +1 more source
Vehicular Ad Hoc Networks (VANETs) take moving vehicles and transport facilities as nodes to form mobile networks through wireless communication technology.
Beibei Yuan, Hui Huang, Chenhuang Wu
doaj +1 more source
Overview of cross site request forgery and client-side protection [PDF]
As long as internet and web application are a part of our lives to let us to live as easy as we moved like: online market, online bank, online shop and many more, it take attention of malicious to take an advantage of our easy life.
Abdullah @ Selimun, Mohd Taufik +3 more
core
Robust and Reversible Thermofluorescence in Solvent‐Free Thermoplastic Polyurethane Composites
Thermofluorescent polymer composites with high‐contrast optical outputs are prepared by solvent‐free blending of indenoquinacridone dye into a thermoplastic polyurethane matrix. The temperature‐dependent fluorescence originates from aggregation–dissociation of the dye molecules, regulated by competing hydrogen bonds from the polymer matrix.
Guanghua Yu +8 more
wiley +1 more source

