Results 41 to 50 of about 257,742 (291)
Generic Construction of Dual-Server Public Key Authenticated Encryption With Keyword Search
In this paper, we propose a generic construction of dual-server public key authenticated encryption with keyword search (DS-PAEKS) from PAEKS, public key encryption, and signatures.
Keita Emura
doaj +1 more source
Face Spoof Attack Detection with Hypergraph Capsule Convolutional Neural Networks
Face authentication has been widely used in personal identification. However, face authentication systems can be attacked by fake images. Existing methods try to detect such attacks with different features.
Yuxin Liang, Chaoqun Hong, Weiwei Zhuang
doaj +1 more source
Nano‐ and Micro‐Sized Solid Materials Used as Antiviral Agents
Due to the rise of viral infections in humans and possible viral outbreaks, the use of nano‐ or micro‐sized materials as antiviral agents is rapidly increasing. This review explores their antiviral properties against RNA and DNA viruses, either as a prevention or a treatment tool, by delving into their mechanisms of action and how to properly assess ...
Orfeas‐Evangelos Plastiras +6 more
wiley +1 more source
Security of discrete log cryptosystems in the random oracle and the generic model [PDF]
We introduce novel security proofs that use combinatorial counting arguments rather than reductions to the discrete logarithm or to the Diffie-Hellman problem. Our security results are sharp and clean with no polynomial reduction times involved.
Jakobsson, Markus, Schnorr, Claus Peter
core
Butterfly wing scales are intricate cuticular functional nanosctructures. This perspective suggests that spatially varying material properties, cytoskeletal constraints, and growth‐driven mechanical instabilities shape the resulting nanoscale architectures created from single cells.
Anupama Prakash +10 more
wiley +1 more source
Anomaly-Based Intrusion on IoT Networks Using AIGAN-a Generative Adversarial Network
Adversarial attacks have threatened the credibility of machine learning models and cast doubts over the integrity of data. The attacks have created much harm in the fields of computer vision, and natural language processing.
Zhipeng Liu +5 more
doaj +1 more source
Efficiency of Scale-Free Networks: Error and Attack Tolerance [PDF]
The concept of network efficiency, recently proposed to characterize the properties of small-world networks, is here used to study the effects of errors and attacks on scale-free networks. Two different kinds of scale-free networks, i.e.
Achacoso +31 more
core +2 more sources
Generalized inversion attack on nonlinear filter generators [PDF]
A nonlinear filter generator is a basic keystream generator for stream cipher applications consisting of a single linear feedback shift register whose output is filtered by a nonlinear combining function. A binary nonlinear filter generator is viewed as a finite input memory automaton with one binary input and one binary output.
Golic, Jovan +2 more
openaire +2 more sources
Omnipolar Magnetic Field Detection by Superlattice‐Based Hall Sensor
Magnetic‐field‐induced electronic switching is demonstrated in unit‐cell‐engineered La0.7Sr0.3MnO3–BiFeO3 superlattices. Distinct substrate terminations modify magnetic and transport properties. Hall resistance measurements show omnipolar, hysteretic anomalous Hall switching above the Curie temperature, arising from Fe─Mn interfacial exchange, enabling
Mark Huijben +6 more
wiley +1 more source
Antimicrobial peptide (AMP)‐loaded nanocarriers provide a multifunctional strategy to combat drug‐resistant Mycobacterium tuberculosis. By enhancing intracellular delivery, bypassing efflux pumps, and disrupting bacterial membranes, this platform restores phagolysosome fusion and macrophage function.
Christian S. Carnero Canales +11 more
wiley +1 more source

