Results 251 to 260 of about 522,468 (334)
Two secure authentication protocols for mitigating vulnerabilities in IoD. [PDF]
Safkhani M, Ghorbani Fard M.
europepmc +1 more source
Physically unclonable functions (PUFs) of reconfigurable feedback field‐effect transistors (R‐FBFETs) with polycrystalline silicon channels are designed for dual entropy sources. The uniqueness and reliability of the dual entropy source PUF are verified by inter‐ and intra‐Hamming distances of 49.13% and 3.47%, respectively, as well as NIST statistical
Taeho Park +4 more
wiley +1 more source
Robust detection framework for adversarial threats in Autonomous Vehicle Platooning. [PDF]
Ness S.
europepmc +1 more source
Stimuli‐Responsive Electrofluidic Nervous System for Autonomous Soft Robots
A stimuli‐responsive electrofluidic nervous system (SENS) is introduced to achieve sensing, signal processing, and decision‐making using soft materials. Comprising fluidic switches and electroactive actuators, SENS enables multimodal stimuli‐responsiveness and autonomous control in soft robots.
Dip Kumar Saha +3 more
wiley +1 more source
Eliminating single points of trust: a hybrid quantum and post-quantum blockchain with distributed key generation. [PDF]
Goh KW +5 more
europepmc +1 more source
This work presents compact, low‐voltage actuators based on electropermanent magnetic interactions. The actuators show good overall performance across key metrics and are implemented in wearable devices and untethered robots. Their ability to operate in different configurations and hold positions without energy input highlights their potential for ...
Arturo Castillo Ugalde +4 more
wiley +1 more source
Edge-Enabled Hybrid Encryption Framework for Secure Health Information Exchange in IoT-Based Smart Healthcare Systems. [PDF]
Ghani NA +4 more
europepmc +1 more source
A step‐efficient stateful logic architecture is demonstrated using a fabricated 32 × 32 memristor crossbar array, enabling parallel n‐bit full adder operations directly in memory. By optimizing load resistance and voltage configurations, the circuit achieves reliable NIMP, AND, and OR logic operations with minimized computational steps, enhanced ...
Jinwoo Park +3 more
wiley +1 more source
Comparative Performance Analysis of Lightweight Cryptographic Algorithms on Resource-Constrained IoT Platforms. [PDF]
Sorescu TG +5 more
europepmc +1 more source

