Results 61 to 70 of about 2,442,732 (352)
Designing secure systems on reconfigurable hardware
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deployment of custom hardware. Embedded systems based on reconfigurable hardware integrate many functions onto a single device. Since embedded designers often have no choice but to use soft IP cores obtained from third parties, the cores operate at different ...
Huffmire, Ted+6 more
openaire +4 more sources
Magnetic‐Driven Torque‐Induced Electrical Stimulation for Millisecond‐Scale Wireless Neuromodulation
MagTIES is a wireless neuromodulation technique with millisecond precision. It employs magnetic‐driven torque from magnetite nanodiscs to activate piezoelectric nanoparticles, enabling precise temporal control of neuronal activity and brain oscillations using weak, low‐frequency magnetic fields.
Chao‐Chun Cheng+5 more
wiley +1 more source
Research on key management and authentication protocol of PDA in smart grid
According to PDA in smart grid, which faced with security issues, key management and authentication protocol for PDA in smart grid based on scrambling PUF were presented.
YU Xiao, TIAN Li, WANG Jie, LIU Zhe
doaj +3 more sources
Thermal Processing Creates Water‐Stable PEDOT:PSS Films for Bioelectronics
Instead of using chemical cross–linkers, it is shown that PEDOT:PSS thin films for bioelectronics become water‐stable after a simple heat treatment. The heat treatment is compatible with a range of rigid and elastomeric substrates and films are stable in vivo for >20 days.
Siddharth Doshi+16 more
wiley +1 more source
ANALYZING AND EVALUATING THE SECURITY STANDARDS IN WIRELESS NETWORK: A REVIEW STUDY
Wireless networks used widely in office, home, and public places so security is one of the significant issues to keep the transmitted information safe. The applied security standards have been developed in response to the demand of high security and the ...
Intisar Shadeed Al-Mejibli+1 more
doaj +1 more source
Hardware Security in Case of Scan Based Attack on Crypto Hardware
The latest innovation technology in computing devices has given a rise of compact, speedy and economical products which also embeds cryptography hardware on-chip. This device generally holds secret key and confidential information, more attention has been given to attacks on hardware which guards such secure information.
Jayesh Popat, Usha Mehta
openaire +3 more sources
This article summarizes significant technological advancements in materials, photonic devices, and bio‐interfaced systems, which demonstrate successful applications for impacting human healthcare via improved therapies, advanced diagnostics, and on‐skin health monitoring.
Seunghyeb Ban+5 more
wiley +1 more source
On-Device Power Analysis Across Hardware Security Domains.
Side-channel power analysis is a powerful method of breaking secure cryptographic algorithms, but typically power analysis is considered to require specialized measurement equipment on or near the device.
Colin O’Flynn, Alex Dewar
doaj +1 more source
Challenges and Opportunities of Upconversion Nanoparticles for Emerging NIR Optoelectronic Devices
The special photo‐responsiveness of upconversion nanoparticles has opened up a new path for the advancement of near‐infrared (NIR)‐responsive optoelectronics. However, challenges such as low energy‐conversion efficiency and high nonradiative losses still persist.
Sunyingyue Geng+7 more
wiley +1 more source
An Innovative Honeypot Architecture for Detecting and Mitigating Hardware Trojans in IoT Devices
The exponential growth and widespread adoption of Internet of Things (IoT) devices have introduced many vulnerabilities. Attackers frequently exploit these flaws, necessitating advanced technological approaches to protect against emerging cyber threats ...
Amira Hossam Eldin Omar+3 more
doaj +1 more source