Results 101 to 110 of about 1,471,228 (283)
Due to the broadcast nature of wireless medium, wireless communication is extremely vulnerable to eavesdropping attack. Physical-layer security is emerging as a new paradigm to prevent the eavesdropper from interception by exploiting the physical ...
Shen, Weiming +2 more
core +1 more source
Two‐Dimensional Reconfigurable Photodiode for In‐Sensor Color Filtering and Spectral Logic
By harnessing the photodoping of different aggregates, the device exhibits wavelength‐dependent volatile‐to‐nonvolatile photoresponses that can be reconfigured via bias modulation. This enables in‐sensor color filtering and spectral‐encrypted information processing, eliminating reliance on external optical filters or post‐processing algorithms ...
Xiaokun Guo +7 more
wiley +1 more source
Zero‐dimensional carbon nanomaterials are presented as multifunctional platforms linking structure, property, and sensing performance. Surface engineering and heteroatom doping modulate electron‐transfer and luminescent behavior, enabling electrochemical, photoluminescent, and electrochemiluminescent detection. Fundamental design principles, analytical
Gustavo Martins +8 more
wiley +1 more source
Challenges and Prospects for the EU’s Area of Freedom, Security and Justice: Recommendations to the European Commission for the Stockholm Programme. CEPS Working Document No. 313, 16 April 2009 [PDF]
The upcoming Swedish presidency of the EU will be in charge of adopting the next multi-annual programme on an Area of Freedom, Security and Justice (AFSJ), during its tenure in the second half of 2009. As the successor of the 2004 Hague Programme, it has
Carrera, Sergio +2 more
core +2 more sources
Forward Secure Non-Interactive Key Exchange [PDF]
Exposure of secret keys is a major concern when cryptographic protocols are implemented on weakly secure devices. Forward security is thus a way to mitigate damages when such an event occurs. In a forward-secure scheme, the public key is indeed fixed while the secret key is updated with a one-way process at regular time periods so that security of the ...
Pointcheval, David, Sanders, Olivier
openaire +2 more sources
BLOC: Buildable and Linkable Organ on a Chip
We developed a “Buildable and Linkable Organ on a Chip” (BLOC) that can construct diverse microphysiological systems (MPSs). The BLOC is standardized to the same size and has one of the functions of “Culture,” “Control,” or “Analysis.” Users can freely configure various MPSs, including developing perfusion, cytotoxicity analysis, and biochemical ...
Yusuke Kimura +7 more
wiley +1 more source
Forward and Backward Private Searchable Encryption for Cloud-Assisted Industrial IoT
In the cloud-assisted industrial Internet of Things (IIoT), since the cloud server is not always trusted, the leakage of data privacy becomes a critical problem. Dynamic symmetric searchable encryption (DSSE) allows for the secure retrieval of outsourced
Tianqi Peng +7 more
doaj +1 more source
Anti‐Slip Material‐Based Strategies and Approaches
This review highlights the principle mechanisms of slipping at the microscale, linking contact mechanics with a friction behavior model for surface interfaces. Main strategies to develop anti‐slip properties to the surfaces are discussed alongside standardized testing approaches.
Sogand Abbaspoor‐Zanjani +3 more
wiley +1 more source
The 5G-AKA protocol, a foundational component for 5G network authentication, has been found vulnerable to various security threats, including linkability attacks that compromise user privacy.
Yongho Ko +2 more
doaj +1 more source
Cryptanalysis of AES-PRF and Its Dual
A dedicated pseudorandom function (PRF) called AES-PRF was proposed by Mennink and Neves at FSE 2018 (ToSC 2017, Issue 3). AES-PRF is obtained from AES by using the output of the 5-th round as the feed-forward to the output state.
Patrick Derbez +6 more
doaj +1 more source

