Results 101 to 110 of about 1,471,228 (283)

Intercept Probability Analysis of Cooperative Wireless Networks with Best Relay Selection in the Presence of Eavesdropping Attack

open access: yes, 2013
Due to the broadcast nature of wireless medium, wireless communication is extremely vulnerable to eavesdropping attack. Physical-layer security is emerging as a new paradigm to prevent the eavesdropper from interception by exploiting the physical ...
Shen, Weiming   +2 more
core   +1 more source

Two‐Dimensional Reconfigurable Photodiode for In‐Sensor Color Filtering and Spectral Logic

open access: yesAdvanced Materials, EarlyView.
By harnessing the photodoping of different aggregates, the device exhibits wavelength‐dependent volatile‐to‐nonvolatile photoresponses that can be reconfigured via bias modulation. This enables in‐sensor color filtering and spectral‐encrypted information processing, eliminating reliance on external optical filters or post‐processing algorithms ...
Xiaokun Guo   +7 more
wiley   +1 more source

Exploring the Potential of Zero‐Dimensional Carbon Nanomaterials in Photoluminescent, Electrochemiluminescent and Electrochemical Sensors

open access: yesAdvanced Materials Interfaces, EarlyView.
Zero‐dimensional carbon nanomaterials are presented as multifunctional platforms linking structure, property, and sensing performance. Surface engineering and heteroatom doping modulate electron‐transfer and luminescent behavior, enabling electrochemical, photoluminescent, and electrochemiluminescent detection. Fundamental design principles, analytical
Gustavo Martins   +8 more
wiley   +1 more source

Challenges and Prospects for the EU’s Area of Freedom, Security and Justice: Recommendations to the European Commission for the Stockholm Programme. CEPS Working Document No. 313, 16 April 2009 [PDF]

open access: yes, 2009
The upcoming Swedish presidency of the EU will be in charge of adopting the next multi-annual programme on an Area of Freedom, Security and Justice (AFSJ), during its tenure in the second half of 2009. As the successor of the 2004 Hague Programme, it has
Carrera, Sergio   +2 more
core   +2 more sources

Forward Secure Non-Interactive Key Exchange [PDF]

open access: yes, 2014
Exposure of secret keys is a major concern when cryptographic protocols are implemented on weakly secure devices. Forward security is thus a way to mitigate damages when such an event occurs. In a forward-secure scheme, the public key is indeed fixed while the secret key is updated with a one-way process at regular time periods so that security of the ...
Pointcheval, David, Sanders, Olivier
openaire   +2 more sources

BLOC: Buildable and Linkable Organ on a Chip

open access: yesAdvanced Materials Technologies, EarlyView.
We developed a “Buildable and Linkable Organ on a Chip” (BLOC) that can construct diverse microphysiological systems (MPSs). The BLOC is standardized to the same size and has one of the functions of “Culture,” “Control,” or “Analysis.” Users can freely configure various MPSs, including developing perfusion, cytotoxicity analysis, and biochemical ...
Yusuke Kimura   +7 more
wiley   +1 more source

Forward and Backward Private Searchable Encryption for Cloud-Assisted Industrial IoT

open access: yesSensors
In the cloud-assisted industrial Internet of Things (IIoT), since the cloud server is not always trusted, the leakage of data privacy becomes a critical problem. Dynamic symmetric searchable encryption (DSSE) allows for the secure retrieval of outsourced
Tianqi Peng   +7 more
doaj   +1 more source

Anti‐Slip Material‐Based Strategies and Approaches

open access: yesAdvanced Materials Technologies, EarlyView.
This review highlights the principle mechanisms of slipping at the microscale, linking contact mechanics with a friction behavior model for surface interfaces. Main strategies to develop anti‐slip properties to the surfaces are discussed alongside standardized testing approaches.
Sogand Abbaspoor‐Zanjani   +3 more
wiley   +1 more source

Formal Security Reassessment of the 5G-AKA-FS Protocol: Methodological Corrections and Augmented Verification Techniques

open access: yesSensors
The 5G-AKA protocol, a foundational component for 5G network authentication, has been found vulnerable to various security threats, including linkability attacks that compromise user privacy.
Yongho Ko   +2 more
doaj   +1 more source

Cryptanalysis of AES-PRF and Its Dual

open access: yesIACR Transactions on Symmetric Cryptology, 2018
A dedicated pseudorandom function (PRF) called AES-PRF was proposed by Mennink and Neves at FSE 2018 (ToSC 2017, Issue 3). AES-PRF is obtained from AES by using the output of the 5-th round as the feed-forward to the output state.
Patrick Derbez   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy