Results 61 to 70 of about 1,471,228 (283)

Parallel 3D Bioprinting on SLIPS‐Microarrays

open access: yesAdvanced Functional Materials, EarlyView.
This work introduces the first truly parallel 3D bioprinting method, enabling both the simultaneous fabrication of hundreds of cell laden hydrogel 3D structures and their HTS in individual liquid compartments. By integrating Digital Light Processing (DLP) stereolithography with functional micropatterns, the platform decouples printing time from array ...
Julius von Padberg   +3 more
wiley   +1 more source

TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer

open access: yes, 2018
Modern low-latency anonymity systems, no matter whether constructed as an overlay or implemented at the network layer, offer limited security guarantees against traffic analysis.
Asoni, Daniele E.   +5 more
core   +1 more source

A Forward-Secure Public-Key Encryption Scheme* [PDF]

open access: yesSSRN Electronic Journal, 2003
Cryptographic computations are often carried out on insecure devices for which the threat of key exposure represents a serious concern. Forward security allows one to mitigate the damage caused by exposure of secret keys. In a forward-secure scheme, secret keys are updated at regular periods of time; exposure of the secret key corresponding to a given ...
Ran Canetti, Shai Halevi, Jonathan Katz
openaire   +1 more source

Meniscus Pixel Printing for Contact‐Lens Vision Sensing and Robotic Control

open access: yesAdvanced Functional Materials, EarlyView.
A visual‐sensing contact lens is enabled by meniscus pixel printing (MPP), which rapidly patterns a 200 µm perovskite photodetector pixel in 1 s without masks, vacuum processing, or bulky equipment. A deep‐learning‐based super‐resolution reconstructs sparse on‐lens signals into 80 × 80 high‐resolution visual information, while AI‐driven eye‐tracking ...
Byung‐Hoon Gong   +7 more
wiley   +1 more source

Forward-Secure Public-Key Encryption Scheme Based on SM9 [PDF]

open access: yesJisuanji kexue yu tansuo
In the traditional hybrid cryptosystem, an attacker can generate the previously used session key to decrypt session contents encrypted under the session key due to the leakage of the current private key.
HUANG Wenfeng, XU Shengmin, MA Jinhua, NING Jianting, WU Wei
doaj   +1 more source

An Institutional Frame to Compare Alternative Market Designs in EU Electricity Balancing [PDF]

open access: yes, 2006
The so-called â electricity wholesale marketâ is, in fact, a sequence of several markets. The chain is closed with a provision for â balancing,â in which energy from all wholesale markets is balanced under the authority of the Transmission Grid ...
Glachant, Jean-Michel, Saguan, Marcelo
core   +4 more sources

Regulated Ion‐Diffusion Hydrogels for Subtle and Multimodal Temperature‐Strain Sensing in Wound Monitoring

open access: yesAdvanced Functional Materials, EarlyView.
A soft, dual‐channel hydrogel patch enables simultaneous detection of wound temperature and strain by integrating ion‐diffusion‐mediated thermoelectric and resistive sensing. The conformal design maintains stable performance during motion, capturing subtle inflammatory and mechanical changes for continuous wound monitoring.
Yu Fang   +7 more
wiley   +1 more source

Attribute-Based Searchable Encryption With Forward Security for Cloud-Assisted IoT

open access: yesIEEE Access
Ciphertext-Policy Attribute-Based Searchable Encryption (CP-ABSE) is one of the most suitable encryption mechanisms in cloud environments for its fine-grained access structure and keyword retrieval capability over the ciphertext.
Dilxat Ghopur
doaj   +1 more source

A Forward-secure Grouping-proof Protocol for Multiple RFID Tags [PDF]

open access: yesInternational Journal of Computational Intelligence Systems, 2012
Designing secure and robust grouping-proof protocols based on RFID characteristics becomes a hotspot in the research of security in Internet of Things (IOT).
Liu Ya-li   +3 more
doaj   +1 more source

Web development evolution: the business perspective on security [PDF]

open access: yes, 2006
Protection of data, information, and knowledge is a hot topic in today’s business environment. Societal, legislative and consumer pressures are forcing companies to examine business strategies, modify processes and acknowledge security to accept and ...
Glisson, L.M.   +2 more
core  

Home - About - Disclaimer - Privacy