Results 71 to 80 of about 1,471,228 (283)
Atomic Layer Deposition in Transistors and Monolithic 3D Integration
Transistors are fundamental building blocks of modern electronics. This review summarizes recent progress in atomic layer deposition (ALD) for the synthesis of two‐dimensional (2D) metal oxides and transition‐metal dichalcogenides (TMDCs), with particular emphasis on their enabling role in monolithic three‐dimensional (M3D) integration for next ...
Yue Liu +5 more
wiley +1 more source
Machine-assisted Cyber Threat Analysis using Conceptual Knowledge Discovery [PDF]
Over the last years, computer networks have evolved into highly dynamic and interconnected environments, involving multiple heterogeneous devices and providing a myriad of services on top of them.
ALIQUINTUY, M +12 more
core
Developing recyclable materials for magnetic robotics that combine rapid response and self‐healing properties is challenging. Hence, this study focuses on the integration of magnetothermal nanoparticles into a dynamic sorbitol‐based vitrimer, a recyclable composite capable of remote actuation and self‐healing by magnetic heating.
Maria Weißpflog +3 more
wiley +1 more source
Novel construction of forward-secure public-key encryption in the standard model
All existing provably secure forward-secure public-key encryption schemes in the literature were only proven to be chosen-plaintext secure. A novel forward-secure public-key encryption scheme without random oracles was pro-posed.
Yang LU, Ji-guo LI
doaj
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency [PDF]
Recently, several practical attacks raised serious concerns over the security of searchable encryption. The attacks have brought emphasis on forward privacy, which is the key concept behind solutions to the adaptive leakage-exploiting attacks, and will ...
Dong, Changyu +4 more
core +1 more source
Shining Light On Shadow Stacks
Control-Flow Hijacking attacks are the dominant attack vector against C/C++ programs. Control-Flow Integrity (CFI) solutions mitigate these attacks on the forward edge,i.e., indirect calls through function pointers and virtual calls.
Burow, Nathan +2 more
core +1 more source
A MXene/PEDOT coating enables multimodal functionality and dual‐analyte detection of dopamine and serotonin in flexible microelectrode arrays while enhancing electrophysiological recording quality. The anti‐fouling, low‐impedance interface overcomes key limitations of conventional coatings, providing a robust and versatile platform to investigate the ...
Ilaria Gatti +8 more
wiley +1 more source
Myocardial infarction often leads to pathological remodelling and ventricular dilatation, key features of HFrEF. This study introduces a personalized, 3D‐printed cardiac restraint device (CARD) printed using rationally designed inks displaying the requested printability and mechanical properties.
Nicola Mansour +6 more
wiley +1 more source
Efficient handover authentication and secure key-updating mechanism for B5G networks
In order to solve the problems of 5G network handover authentication and key update mechanism, such as lacking of forward security, being vulnerable to bypass attack and having signaling congestion, for 5G enhanced (B5G) network, an efficient handover ...
Qimei CUI +6 more
doaj +2 more sources
Engineered microparticle topographies direct human mesenchymal stem cell osteogenesis without biochemical additives. This osteogenic commitment is driven by canonical Hedgehog signaling and followed by temporal IGF‐II engagement. Two‐photon polymerization demonstrates spatial control, enabling the engineering of topographical gradients that pattern ...
Fatmah I. Ghuloum +5 more
wiley +1 more source

