Results 61 to 70 of about 33,830 (312)
Smart Catheters for Diagnosis, Monitoring, and Therapy
This study presents a comprehensive review of smart catheters, an emerging class of medical devices that integrate embedded sensors, robotics, and communication systems, offering increased functionality and complexity to enable real‐time health monitoring, diagnostics, and treatment. Abstract This review explores smart catheters as an emerging class of
Azra Yaprak Tarman +12 more
wiley +1 more source
Research on key management and authentication protocol of PDA in smart grid
According to PDA in smart grid,which faced with security issues,key management and authentication protocol for PDA in smart grid based on scrambling PUF were presented.With the construction of mobile trusted platform by trusted hardware module and PDA,a ...
Xiao YU, Li TIAN, Zhe LIU, Jie WANG
doaj +3 more sources
Thermal Processing Creates Water‐Stable PEDOT:PSS Films for Bioelectronics
Instead of using chemical cross–linkers, it is shown that PEDOT:PSS thin films for bioelectronics become water‐stable after a simple heat treatment. The heat treatment is compatible with a range of rigid and elastomeric substrates and films are stable in vivo for >20 days.
Siddharth Doshi +16 more
wiley +1 more source
A Practical Recovery Mechanism for Blockchain Hardware Wallets
Blockchain hardware wallets, through their security-by-design architecture, offer higher security assurances. They fundamentally differ from software wallets due to an important security property called Unicity.
Varun Deshpande +2 more
doaj +1 more source
Fixing Hardware Security Bugs with Large Language Models [PDF]
Baleegh Ahmad +4 more
openalex +1 more source
Ferroelectric Quantum Dots for Retinomorphic In‐Sensor Computing
This work has provided a protocol for fabricating retinomorphic phototransistors by integrating ferroelectric ligands with quantum dots. The resulting device combines ferroelectricity, optical responsiveness, and low‐power operation to enable adaptive signal amplification and high recognition accuracy under low‐light conditions, while supporting ...
Tingyu Long +26 more
wiley +1 more source
Hardware Trojan Detection in Open-Source Hardware Designs Using Machine Learning
The globalization of the hardware supply chain reduces costs but increases security challenges with the potential insertion of hardware trojans by third parties.
Victor Takashi Hayashi +1 more
doaj +1 more source
Cube Stripping Function and Logic Restoration Based Hardware Security [PDF]
Suresh Kannan P, J Rangarajan, C Selvi
openalex +1 more source
Bioinspired Adaptive Sensors: A Review on Current Developments in Theory and Application
This review comprehensively summarizes the recent progress in the design and fabrication of sensory‐adaptation‐inspired devices and highlights their valuable applications in electronic skin, wearable electronics, and machine vision. The existing challenges and future directions are addressed in aspects such as device performance optimization ...
Guodong Gong +12 more
wiley +1 more source
Hardware Assisted Security Platform [PDF]
Embedded systems are often used to monitor and control various dynamic and complex applications. However, with greater accessibility and added features on many embedded systems, more and more systems are being subject to sophisticated and new types of attacks.
openaire +1 more source

