Results 61 to 70 of about 1,471,228 (283)
Parallel 3D Bioprinting on SLIPS‐Microarrays
This work introduces the first truly parallel 3D bioprinting method, enabling both the simultaneous fabrication of hundreds of cell laden hydrogel 3D structures and their HTS in individual liquid compartments. By integrating Digital Light Processing (DLP) stereolithography with functional micropatterns, the platform decouples printing time from array ...
Julius von Padberg +3 more
wiley +1 more source
TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer
Modern low-latency anonymity systems, no matter whether constructed as an overlay or implemented at the network layer, offer limited security guarantees against traffic analysis.
Asoni, Daniele E. +5 more
core +1 more source
A Forward-Secure Public-Key Encryption Scheme* [PDF]
Cryptographic computations are often carried out on insecure devices for which the threat of key exposure represents a serious concern. Forward security allows one to mitigate the damage caused by exposure of secret keys. In a forward-secure scheme, secret keys are updated at regular periods of time; exposure of the secret key corresponding to a given ...
Ran Canetti, Shai Halevi, Jonathan Katz
openaire +1 more source
Meniscus Pixel Printing for Contact‐Lens Vision Sensing and Robotic Control
A visual‐sensing contact lens is enabled by meniscus pixel printing (MPP), which rapidly patterns a 200 µm perovskite photodetector pixel in 1 s without masks, vacuum processing, or bulky equipment. A deep‐learning‐based super‐resolution reconstructs sparse on‐lens signals into 80 × 80 high‐resolution visual information, while AI‐driven eye‐tracking ...
Byung‐Hoon Gong +7 more
wiley +1 more source
Forward-Secure Public-Key Encryption Scheme Based on SM9 [PDF]
In the traditional hybrid cryptosystem, an attacker can generate the previously used session key to decrypt session contents encrypted under the session key due to the leakage of the current private key.
HUANG Wenfeng, XU Shengmin, MA Jinhua, NING Jianting, WU Wei
doaj +1 more source
An Institutional Frame to Compare Alternative Market Designs in EU Electricity Balancing [PDF]
The so-called â electricity wholesale marketâ is, in fact, a sequence of several markets. The chain is closed with a provision for â balancing,â in which energy from all wholesale markets is balanced under the authority of the Transmission Grid ...
Glachant, Jean-Michel, Saguan, Marcelo
core +4 more sources
A soft, dual‐channel hydrogel patch enables simultaneous detection of wound temperature and strain by integrating ion‐diffusion‐mediated thermoelectric and resistive sensing. The conformal design maintains stable performance during motion, capturing subtle inflammatory and mechanical changes for continuous wound monitoring.
Yu Fang +7 more
wiley +1 more source
Attribute-Based Searchable Encryption With Forward Security for Cloud-Assisted IoT
Ciphertext-Policy Attribute-Based Searchable Encryption (CP-ABSE) is one of the most suitable encryption mechanisms in cloud environments for its fine-grained access structure and keyword retrieval capability over the ciphertext.
Dilxat Ghopur
doaj +1 more source
A Forward-secure Grouping-proof Protocol for Multiple RFID Tags [PDF]
Designing secure and robust grouping-proof protocols based on RFID characteristics becomes a hotspot in the research of security in Internet of Things (IOT).
Liu Ya-li +3 more
doaj +1 more source
Web development evolution: the business perspective on security [PDF]
Protection of data, information, and knowledge is a hot topic in today’s business environment. Societal, legislative and consumer pressures are forcing companies to examine business strategies, modify processes and acknowledge security to accept and ...
Glisson, L.M. +2 more
core

