Results 71 to 80 of about 526,457 (288)
Zero‐dimensional carbon nanomaterials are presented as multifunctional platforms linking structure, property, and sensing performance. Surface engineering and heteroatom doping modulate electron‐transfer and luminescent behavior, enabling electrochemical, photoluminescent, and electrochemiluminescent detection. Fundamental design principles, analytical
Gustavo Martins +8 more
wiley +1 more source
On-Device Power Analysis Across Hardware Security Domains.
Side-channel power analysis is a powerful method of breaking secure cryptographic algorithms, but typically power analysis is considered to require specialized measurement equipment on or near the device.
Colin O’Flynn, Alex Dewar
doaj +1 more source
Device calibration impacts security of quantum key distribution
Characterizing the physical channel and calibrating the cryptosystem hardware are prerequisites for establishing a quantum channel for quantum key distribution (QKD).
C. H. Bennett +9 more
core +1 more source
This review explores advances in wearable and lab‐on‐chip technologies for breast cancer detection. Covering tactile, thermal, ultrasound, microwave, electrical impedance tomography, electrochemical, microelectromechanical, and optical systems, it highlights innovations in flexible electronics, nanomaterials, and machine learning.
Neshika Wijewardhane +4 more
wiley +1 more source
This work establishes a framework for high‐resolution printed interconnects by coupling e‐jet printing control, multilayer deposition, and sintering optimization. Ink properties and printing speed influence particle stacking, while different sintering atmospheres drive distinct microstructural evolution.
Kaifan Yue +6 more
wiley +1 more source
An Innovative Honeypot Architecture for Detecting and Mitigating Hardware Trojans in IoT Devices
The exponential growth and widespread adoption of Internet of Things (IoT) devices have introduced many vulnerabilities. Attackers frequently exploit these flaws, necessitating advanced technological approaches to protect against emerging cyber threats ...
Amira Hossam Eldin Omar +3 more
doaj +1 more source
Open-TEE - An Open Virtual Trusted Execution Environment
Hardware-based Trusted Execution Environments (TEEs) are widely deployed in mobile devices. Yet their use has been limited primarily to applications developed by the device vendors. Recent standardization of TEE interfaces by GlobalPlatform (GP) promises
Asokan, N. +3 more
core +1 more source
Chemically Doped Conductive Polymers for Wearable Health Monitoring
Among conductive polymers, poly(3,4‐ethylenedioxythiophene):poly(styrenesulfonate) (PEDOT:PSS), polyaniline (PANI), and polypyrrole (PPy) are the most studied and applied. Chemical doping significantly boosts intrinsic conductivity and mechanical robustness.
Mengdi Zuo +5 more
wiley +1 more source
A hardware Trojan attack protection method for CGRCA configuration bitstream
A protection method based on authentication and encryption hardware security engine is proposed as the reconfigurable device configuration bitstream is vulnerable to hardware Trojan attacks.
Liu Min, Yan Yingjian, Nan Longmei
doaj +1 more source
Passive Shape‐Adaptive Fluidic Interface for Enhanced Skin‐Sensor Coupling in Wearable Devices
This study presents a passive fluidic interface for wearable biosensors that adapts to static and dynamic body shape changes to maintain consistent skin contact. Flexible, fluid‐filled pouches redistribute pressure from high‐load areas to regions requiring improved contact, enhancing signal quality and comfort in a compact, low‐energy design for ...
Natalia Sanchez‐Tamayo +6 more
wiley +1 more source

