Results 81 to 90 of about 1,471,228 (283)

RFID security authentication scheme based on Montgomery-form elliptic curve cryptography

open access: yesDianxin kexue, 2016
For the issues that the existing RFID security authentication scheme based on elliptic curve cryptography (ECC)can not meet the requirements of mutual authentication,privacy protection and forward security,a RFID security authentication scheme based on ...
Wumei ZHANG
doaj   +2 more sources

Quantum-Resistant Forward-Secure Digital Signature Scheme Based on q-ary Lattices

open access: yesJournal of Telecommunications and Information Technology
In this paper, we design and consider a new digital signature scheme with an evolving secret key, using random q-ary lattices as its domain. It is proved that, in addition to offering classic eu-cma security, the scheme is existentially forward ...
Mariusz Jurkiewicz
doaj   +1 more source

Smart Face Masks as Wearable Respiratory Sensors: A Review of Sensor Technologies, Materials, and Future Directions

open access: yesAdvanced Healthcare Materials, EarlyView.
This review highlights recent advances in smart face masks that actively monitor breathing. By integrating humidity, gas, temperature, pressure, strain, and triboelectric sensors, these masks track key respiratory parameters in real time. The article summarizes sensor mechanisms, compares performance across studies, and discusses challenges and future ...
Negin Faramarzi   +7 more
wiley   +1 more source

Social Security and Retirement [PDF]

open access: yes
A critical question for Social Security policy is how program incentives affect retirement behavior. We use the wealth of new data available through the Health and Retirement Survey (HRS) to examine the impact of Social Security incentives on male ...
Courtney Coile, Jonathan Gruber
core  

Ferroelectric Quantum Dots for Retinomorphic In‐Sensor Computing

open access: yesAdvanced Materials, EarlyView.
This work has provided a protocol for fabricating retinomorphic phototransistors by integrating ferroelectric ligands with quantum dots. The resulting device combines ferroelectricity, optical responsiveness, and low‐power operation to enable adaptive signal amplification and high recognition accuracy under low‐light conditions, while supporting ...
Tingyu Long   +26 more
wiley   +1 more source

Forward Secure Ring Signature without Random Oracles [PDF]

open access: yes, 2011
In this paper, we propose a forward secure ring signature scheme without random oracles. With forward security, if a secret key of a corresponding ring member is exposed, all previously signed signatures containing this member remain valid. Yet the one who has stolen the secret key cannot produce any valid signature belonged to the past time period ...
Yuen, TH, Liu, JK, Zhou, J
openaire   +2 more sources

Bioinspired Adaptive Sensors: A Review on Current Developments in Theory and Application

open access: yesAdvanced Materials, EarlyView.
This review comprehensively summarizes the recent progress in the design and fabrication of sensory‐adaptation‐inspired devices and highlights their valuable applications in electronic skin, wearable electronics, and machine vision. The existing challenges and future directions are addressed in aspects such as device performance optimization ...
Guodong Gong   +12 more
wiley   +1 more source

Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays

open access: yes, 2015
We enhance the physical-layer security (PLS) of amplify-and-forward relaying networks with the aid of joint relay and jammer selection (JRJS), despite the deliterious effect of channel state information (CSI) feedback delays.
Cai, Yueming   +4 more
core   +1 more source

Secure Inter-domain Routing and Forwarding via Verifiable Forwarding Commitments

open access: yes, 2023
The Internet inter-domain routing system is vulnerable. On the control plane, the de facto Border Gateway Protocol (BGP) does not have built-in mechanisms to authenticate routing announcements, so an adversary can announce virtually arbitrary paths to hijack network traffic; on the data plane, it is difficult to ensure that actual forwarding path ...
Wang, Xiaoliang   +8 more
openaire   +2 more sources

Tough, Ductile, and Strong Hard‐Soft Cementitious Composite Enabled by Multi‐Material Additive Manufacturing

open access: yesAdvanced Materials, EarlyView.
Drawing inspiration from the layered hard‐soft architecture found in sea sponges, this work establishes a new framework for architected cementitious composites (ACC) through multi‐material additive manufacturing (MMAM) process. The integration of mortar and elastomer phases into layered architectures enables synergistic toughening mechanisms, including
Aimane Najmeddine   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy