Results 81 to 90 of about 1,471,228 (283)
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
For the issues that the existing RFID security authentication scheme based on elliptic curve cryptography (ECC)can not meet the requirements of mutual authentication,privacy protection and forward security,a RFID security authentication scheme based on ...
Wumei ZHANG
doaj +2 more sources
Quantum-Resistant Forward-Secure Digital Signature Scheme Based on q-ary Lattices
In this paper, we design and consider a new digital signature scheme with an evolving secret key, using random q-ary lattices as its domain. It is proved that, in addition to offering classic eu-cma security, the scheme is existentially forward ...
Mariusz Jurkiewicz
doaj +1 more source
This review highlights recent advances in smart face masks that actively monitor breathing. By integrating humidity, gas, temperature, pressure, strain, and triboelectric sensors, these masks track key respiratory parameters in real time. The article summarizes sensor mechanisms, compares performance across studies, and discusses challenges and future ...
Negin Faramarzi +7 more
wiley +1 more source
Social Security and Retirement [PDF]
A critical question for Social Security policy is how program incentives affect retirement behavior. We use the wealth of new data available through the Health and Retirement Survey (HRS) to examine the impact of Social Security incentives on male ...
Courtney Coile, Jonathan Gruber
core
Ferroelectric Quantum Dots for Retinomorphic In‐Sensor Computing
This work has provided a protocol for fabricating retinomorphic phototransistors by integrating ferroelectric ligands with quantum dots. The resulting device combines ferroelectricity, optical responsiveness, and low‐power operation to enable adaptive signal amplification and high recognition accuracy under low‐light conditions, while supporting ...
Tingyu Long +26 more
wiley +1 more source
Forward Secure Ring Signature without Random Oracles [PDF]
In this paper, we propose a forward secure ring signature scheme without random oracles. With forward security, if a secret key of a corresponding ring member is exposed, all previously signed signatures containing this member remain valid. Yet the one who has stolen the secret key cannot produce any valid signature belonged to the past time period ...
Yuen, TH, Liu, JK, Zhou, J
openaire +2 more sources
Bioinspired Adaptive Sensors: A Review on Current Developments in Theory and Application
This review comprehensively summarizes the recent progress in the design and fabrication of sensory‐adaptation‐inspired devices and highlights their valuable applications in electronic skin, wearable electronics, and machine vision. The existing challenges and future directions are addressed in aspects such as device performance optimization ...
Guodong Gong +12 more
wiley +1 more source
We enhance the physical-layer security (PLS) of amplify-and-forward relaying networks with the aid of joint relay and jammer selection (JRJS), despite the deliterious effect of channel state information (CSI) feedback delays.
Cai, Yueming +4 more
core +1 more source
Secure Inter-domain Routing and Forwarding via Verifiable Forwarding Commitments
The Internet inter-domain routing system is vulnerable. On the control plane, the de facto Border Gateway Protocol (BGP) does not have built-in mechanisms to authenticate routing announcements, so an adversary can announce virtually arbitrary paths to hijack network traffic; on the data plane, it is difficult to ensure that actual forwarding path ...
Wang, Xiaoliang +8 more
openaire +2 more sources
Drawing inspiration from the layered hard‐soft architecture found in sea sponges, this work establishes a new framework for architected cementitious composites (ACC) through multi‐material additive manufacturing (MMAM) process. The integration of mortar and elastomer phases into layered architectures enables synergistic toughening mechanisms, including
Aimane Najmeddine +5 more
wiley +1 more source

