Results 91 to 100 of about 38,037 (283)
A two‐step authentication framework for Mobile ad hoc networks [PDF]
The lack of fixed infrastructure in ad hoc networks causes nodes to rely more heavily on peer nodes for communication. Nevertheless, establishing trust in such a distributed environment is very difficult, since it is not straightforward for a node to ...
Douligeris, C. +2 more
core
Cuttlebone‐inspired metamaterials exploit a septum‐wall architecture to achieve excellent mechanical and functional properties. This review classifies existing designs into direct biomimetic, honeycomb‐type, and strut‐type architectures, summarizes governing design principles, and presents a decoupled design framework for interpreting multiphysical ...
Xinwei Li, Zhendong Li
wiley +1 more source
URDP: General Framework for Direct CCA2 Security from any Lattice-Based PKE Scheme [PDF]
Design efficient lattice-based cryptosystem secure against adaptive chosen ciphertext attack (IND-CCA2) is a challenge problem. To the date, full CCA2-security of all proposed lattice-based PKE schemes achieved by using a generic transformations such as ...
Rastaghi, Roohallah
core
The citric acid/urea (CA‐Urea) precursor system offers a versatile, scalable route to carbon dots with tunable luminescence and multifunctionality. Mechanistic insights into precursor chemistry and reaction parameters have enabled doping, surface modification, and hybridization strategies, yielding CDs for luminescent devices, sensing, catalysis ...
Yupeng Liu +10 more
wiley +1 more source
Multi‐Scale Interface Engineering of MXenes for Multifunctional Sensory Systems
MXenes, as two‐dimensional transition metal carbides and nitrides, demonstrate remarkable capabilities for multifunctional sensing applications. This review systematically examines multi‐scale interface engineering approaches that enhance sensing performance, enable diverse detection functionalities, and improve system‐level compatibility in MXene ...
Jiaying Liao, Sin‐Yi Pang, Jianhua Hao
wiley +1 more source
Hierarchical Identity-Based Encryption with Constant-Size Private Keys [PDF]
Leyou Zhang
openalex +2 more sources
A Hierarchical Authorization Reversible Data Hiding in Encrypted Image Based on Secret Sharing
In the current distributed environment, reversible data hiding in encrypted domain (RDH-ED) cannot grant corresponding privileges according to users’ identity classes.
Chao Jiang +4 more
doaj +1 more source
Dynamic virtual private network provisioning from multiple cloud infrastructure service providers [PDF]
The Cloud infrastructure service providers currently provision basic virtualized computing resources as on demand and dynamic services but there is no common framework in existence that allows the seamless provisioning of even these basic services across
Dimitrakos, T. +4 more
core
Atomic Layer Deposition in Transistors and Monolithic 3D Integration
Transistors are fundamental building blocks of modern electronics. This review summarizes recent progress in atomic layer deposition (ALD) for the synthesis of two‐dimensional (2D) metal oxides and transition‐metal dichalcogenides (TMDCs), with particular emphasis on their enabling role in monolithic three‐dimensional (M3D) integration for next ...
Yue Liu +5 more
wiley +1 more source
Bioprinting Organs—Science or Fiction?—A Review From Students to Students
Bioprinting artificial organs has the potential to revolutionize the medical field. This is a comprehensive review of the bioprinting workflow delving into the latest advancements in bioinks, materials and bioprinting techniques, exploring the critical stages of tissue maturation and functionality.
Nicoletta Murenu +18 more
wiley +1 more source

