Results 41 to 50 of about 10,775 (222)
You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information [PDF]
Metadata are associated to most of the information we produce in our daily interactions and communication in the digital world. Yet, surprisingly, metadata are often still catergorized as non-sensitive.
Musolesi, Mirco +2 more
core +2 more sources
A reconfigurable physical unclonable function is developed using CMOS‐integrated SOT‐MRAM chips, leveraging a dual‐pulse strategy and offering enhanced environmental robustness. A temperature‐compensation effect arising from the CMOS transistor and SOT‐MTJ is revealed and established as a key prerequisite for thermal resilience.
Min Wang +7 more
wiley +1 more source
Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name [PDF]
An `obfuscation' for encrypted computing is quantified exactly here, leading to an argument that security against polynomial-time attacks has been achieved for user data via the deliberately `chaotic' compilation required for security properties in that ...
Breuer, Peter T.
core +1 more source
RETRACTED: Learner emotions and performance in hypercasual VR games with adaptive AI difficulty
Abstract Hypercasual virtual reality games (HVRGs) are widely regarded as cost‐effective tools for rapid skill acquisition, yet the mechanisms that optimise their effectiveness and user acceptance remain insufficiently explored. This mixed‐methods empirical study investigates how playful emotions, characterised by engagement, enjoyment and anxiety ...
Zeeshan Ahmed, Faizan Ahmad, Chen Hui
wiley +1 more source
With the rapid advancement of quantum computing, quantum compilation has become a crucial layer connecting high-level algorithms with physical hardware.
Chenyi Zhang +3 more
doaj +1 more source
ABSTRACT The solar photovoltaic (PV) installations, which are essential for renewable energy systems, are vulnerable to partial shading, resulting in considerable power losses and operational inefficiencies. The dynamic reconfiguration of PV arrays has become an effective strategy to mitigate these effects by adaptively modifying the array topology to ...
Manoharan Premkumar +3 more
wiley +1 more source
Design of domino logic obfuscation circuit based on dummy contacts
Through the study of the logic obfuscation circuit and the physical level camouflage technology, a scheme of the domino logic obfuscation circuit is proposed based on dummy contacts, which can prevent reverse engineering.
Li Liwei, Wang Pengjun, Zhang Yuejun
doaj +1 more source
Noise‐based logic locking scheme against signal probability skew analysis
Due to integrated circuit (IC) production chain globalisation, several new threats such as hardware trojans, counterfeiting and overproduction are threatening the IC industry. So logic locking is deployed to hinder these security threats.
Ahmad Rezaei, Ali Mahani
doaj +1 more source
ABSTRACT Immersive virtual reality (IVR) is widely promoted as a means of enriching learning in science, technology, engineering, arts and mathematics (STEAM), yet evidence of its capacity to foster equitable classroom experiences for marginalised groups remains limited, particularly outside traditional STEM domains.
Carly Waterhouse‐Boot +1 more
wiley +1 more source
FinTech and Environmental Sustainability: Evidence From Brazil
ABSTRACT This study explores the dynamic interplay between economic growth and environmental sustainability from a FinTech perspective, using Brazil as a case study. While FinTech's contribution to green transformation, sustainable finance, and resource efficiency has gained increasing attention, a notable lack of empirical research remains to assess ...
Kemal Eyuboglu, Umut Uzar
wiley +1 more source

