Results 51 to 60 of about 139,929 (306)
Assembly of Cell‐Seeded 3D Printed Hydrogel Modules with Perfusable Channel Networks
Macroscale assembly was utilized to prepare perfusable tissue constructs from individually 3D printed hydrogel modules with embedded branched channel networks and port arrays for cell seeding. Novel multi‐material bioreactors were fabricated to facilitate the gluing of individual modules and the perfusion culture of assembled modular constructs seeded ...
Zachary J. Geffert +10 more
wiley +1 more source
Elliptic curve cryptography (ECC) over prime fields relies on scalar point multiplication realized by point addition and point doubling. Point addition and point doubling operations consist of many modular multiplications of large operands (256 bits for ...
Yamin Li
doaj +1 more source
This review highlights recent advances in smart face masks that actively monitor breathing. By integrating humidity, gas, temperature, pressure, strain, and triboelectric sensors, these masks track key respiratory parameters in real time. The article summarizes sensor mechanisms, compares performance across studies, and discusses challenges and future ...
Negin Faramarzi +7 more
wiley +1 more source
Microservice architectures exploit container-based virtualized services, which rarely use hardware-based cryptography. A trusted platform module (TPM) offers a hardware root for trust in services that makes use of cryptographic operations.
Antonio J. Cabrera-Gutiérrez +5 more
doaj +1 more source
Trojans in Early Design Steps—An Emerging Threat [PDF]
Hardware Trojans inserted by malicious foundries during integrated circuit manufacturing have received substantial attention in recent years. In this paper, we focus on a different type of hardware Trojan threats: attacks in the early steps of design
Becker, Georg T. +2 more
core
Ferroelectric Quantum Dots for Retinomorphic In‐Sensor Computing
This work has provided a protocol for fabricating retinomorphic phototransistors by integrating ferroelectric ligands with quantum dots. The resulting device combines ferroelectricity, optical responsiveness, and low‐power operation to enable adaptive signal amplification and high recognition accuracy under low‐light conditions, while supporting ...
Tingyu Long +26 more
wiley +1 more source
Design of a secure encryption circuit for SHE specification
To enhance the defense capability of automotive system information security, a secure encryption circuit is designed for secure hardware extensions specification.
Shi Xingqiang, Liu Mengying, Wang Fenfen
doaj +1 more source
Provable security against generic attacks on stream ciphers
Recent lightweight hardware-based stream cipher designs keep an external non-volatile internal state that is not part of the cipher’s hardware module. The purpose of these so-called small-state ciphers is to keep the size of the hardware and the power ...
Moch Alexander
doaj +1 more source
As technology evolves, embedded systems access more networks and devices, which means more security threats. Existing security-monitoring methods with a single parameter (data or control flow) are not effective in detecting attackers tampering with the ...
Qiang Hao +7 more
doaj +1 more source
Bioinspired Adaptive Sensors: A Review on Current Developments in Theory and Application
This review comprehensively summarizes the recent progress in the design and fabrication of sensory‐adaptation‐inspired devices and highlights their valuable applications in electronic skin, wearable electronics, and machine vision. The existing challenges and future directions are addressed in aspects such as device performance optimization ...
Guodong Gong +12 more
wiley +1 more source

