Results 51 to 60 of about 1,471,228 (283)

Optimal Checkpointing for Secure Intermittently-Powered IoT Devices

open access: yes, 2017
Energy harvesting is a promising solution to power Internet of Things (IoT) devices. Due to the intermittent nature of these energy sources, one cannot guarantee forward progress of program execution.
Garg, Siddharth   +2 more
core   +1 more source

All‐in‐One Analog AI Hardware: On‐Chip Training and Inference with Conductive‐Metal‐Oxide/HfOx ReRAM Devices

open access: yesAdvanced Functional Materials, EarlyView.
An all‐in‐one analog AI accelerator is presented, enabling on‐chip training, weight retention, and long‐term inference acceleration. It leverages a BEOL‐integrated CMO/HfOx ReRAM array with low‐voltage operation (<1.5 V), multi‐bit capability over 32 states, low programming noise (10 nS), and near‐ideal weight transfer.
Donato Francesco Falcone   +11 more
wiley   +1 more source

IPO-PEKS: Effective Inner Product Outsourcing Public Key Searchable Encryption From Lattice in the IoT

open access: yesIEEE Access
Lightweight devices in the Internet of Things (IoT) typically need to store massive data on a cloud server with strong processing and storage capabilities for later retrieval and usage.
Miao Wang   +3 more
doaj   +1 more source

Photoswitching Conduction in Framework Materials

open access: yesAdvanced Functional Materials, EarlyView.
This mini‐review summarizes recent advances in state‐of‐the‐art proton and electron conduction in framework materials that can be remotely and reversibly switched on and off by light. It discusses the various photoswitching conduction mechanisms and the strategies employed to enhance photoswitched conductivity.
Helmy Pacheco Hernandez   +4 more
wiley   +1 more source

Exploiting Hidden Information Leakages in Backward Privacy for Dynamic Searchable Symmetric Encryption

open access: yesApplied Sciences
Dynamic searchable symmetric encryption (DSSE) enables searches over encrypted data as well as data dynamics such as flexible data addition and deletion operations.
Hyundo Yoon   +4 more
doaj   +1 more source

The Failed Critique of Personal Accounts [PDF]

open access: yes, 2001
Even though President Bush's Commission to Strengthen Social Security has yet to produce a specific proposal to establish a personal account option for Social Security, opponents of the idea have already put forward a barrage of objections and criticisms.
Peter Ferrara
core  

From Clinic to Computation: Multiscale Bioengineering Strategies for Durable Biological Aortic Valve Replacements

open access: yesAdvanced Functional Materials, EarlyView.
Bioprosthetic aortic valves have revolutionized the treatment of aortic stenosis, but their durability is limited by structural valve deterioration (SVD). This review focuses on the pericardial tissue at the heart of these valves, examining how its mechanical properties and calcification drive fatigue and failure.
Gabriele Greco   +7 more
wiley   +1 more source

Telerehabilitation Store and Forward Applications: A Review of Applications and Privacy Considerations in Physical and Occupational Therapy Practice

open access: yesInternational Journal of Telerehabilitation, 2015
An overview of store and forward applications commonly used in physical and occupational therapy practice is reviewed with respect to regulation, privacy, security, and clinical applications. A privacy and security checklist provides a clear reference of
Christopher Peterson, Valerie Watzlaf
doaj   +1 more source

Security in Pervasive Computing: Current Status and Open Issues [PDF]

open access: yes, 2006
Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing, new and unique capabilities are available to aid mobile societies.
Ahamed, Sheikh Iqbal, Haque, Munirul
core   +1 more source

Entangled cloud storage [PDF]

open access: yes, 2016
Entangled cloud storage (Aspnes et al., ESORICS 2004) enables a set of clients to “entangle” their files into a single clew to be stored by a (potentially malicious) cloud provider.
Ateniese, Giuseppe   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy