Results 91 to 100 of about 95,937 (276)
With the rapid development of information technologies, security violations in online social networks (OSN) have emerged as a critical issue. Traditional technical and organizational approaches do not consider economic factors, which are increasingly ...
Guang Zhu, Hu Liu, Mining Feng
doaj +1 more source
On information-theoretic security
In this work, we tackle a selection of contemporary problems in informationtheoretic security. Motivated by recent results regarding multipath transmission, we first review some necessary conditions for perfectly secret communication, and point out the network topology to play a crucial role.
openaire +2 more sources
Triply‐twinned architected lattices transform deformation from bending to stretching of struts, delivering up to threefold increases in stiffness and strength across polymeric and metallic systems. High‐resolution synchrotron XCT and image‐based simulations reveal how meta‐grain architecture, defects, and AM build orientation govern failure pathways ...
David McArthur +7 more
wiley +1 more source
Secure transmission of correlated sources over broadcast channels with ultra-low latency
Correlated sources passing through broadcast channels is considered in this paper. Each receiver has access to correlated source side information and each source at the sender is kept secret from the unintended receiver.
Hehe Chen, Ping Zhu
doaj +1 more source
Flexible Dielectric Acoustic Resonator Patch for Tissue Regeneration
A flexible dielectric acoustic resonator patch enables MHz‐range ultrasound generation through resonance amplification without using piezoelectric materials. Conformal integration on a curved substrate allows efficient acoustic delivery to tissue‐mimicking environments.
Donyoung Kang +7 more
wiley +1 more source
Symbolic Abstractions for Quantum Protocol Verification [PDF]
Quantum protocols such as the BB84 Quantum Key Distribution protocol exchange qubits to achieve information-theoretic security guarantees. Many variants thereof were proposed, some of them being already deployed.
Hirschi, Lucca
core +2 more sources
Light‐Induced Entropy for Secure Vision
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo +9 more
wiley +1 more source
With an increasing number of firms in cybersecurity information-sharing platforms, the potential cyber risks become a critical challenge during the exchanging of information.
Liurong Zhao +3 more
doaj +1 more source
A nano‐interception strategy disrupts pathogenic fibroblast–macrophage crosstalk in chronic heart failure. Scalable Prussian blue nanoparticles selectively sequester CCL2 via ultrahigh‐affinity binding, preventing CCR2+ macrophage recruitment and breaking a key fibro‐inflammatory circuit. This approach demonstrates robust efficacy in murine and porcine
Bo Chen +16 more
wiley +1 more source
All‐Optical Reconfigurable Physical Unclonable Function for Sustainable Security
An all‐optical reconfigurable physical unclonable function (PUF) is demonstrated using plasmonic coupling–induced sintering of optically trapped gold nanoparticles, where Brownian motion serves as a robust entropy source. The resulting optical PUF exhibits high encoding density, strong resistance to modeling attacks, and practical authentication ...
Jang‐Kyun Kwak +4 more
wiley +1 more source

