Results 91 to 100 of about 95,937 (276)

Sustainability of Information Security Investment in Online Social Networks: An Evolutionary Game-Theoretic Approach

open access: yesMathematics, 2018
With the rapid development of information technologies, security violations in online social networks (OSN) have emerged as a critical issue. Traditional technical and organizational approaches do not consider economic factors, which are increasingly ...
Guang Zhu, Hu Liu, Mining Feng
doaj   +1 more source

On information-theoretic security

open access: yes, 2018
In this work, we tackle a selection of contemporary problems in informationtheoretic security. Motivated by recent results regarding multipath transmission, we first review some necessary conditions for perfectly secret communication, and point out the network topology to play a crucial role.
openaire   +2 more sources

Triply‐Twinned Metamaterials: Unraveling the Mechanics and Failure Pathways Through High‐Resolution XCT

open access: yesAdvanced Materials, EarlyView.
Triply‐twinned architected lattices transform deformation from bending to stretching of struts, delivering up to threefold increases in stiffness and strength across polymeric and metallic systems. High‐resolution synchrotron XCT and image‐based simulations reveal how meta‐grain architecture, defects, and AM build orientation govern failure pathways ...
David McArthur   +7 more
wiley   +1 more source

Secure transmission of correlated sources over broadcast channels with ultra-low latency

open access: yesEURASIP Journal on Wireless Communications and Networking, 2019
Correlated sources passing through broadcast channels is considered in this paper. Each receiver has access to correlated source side information and each source at the sender is kept secret from the unintended receiver.
Hehe Chen, Ping Zhu
doaj   +1 more source

Flexible Dielectric Acoustic Resonator Patch for Tissue Regeneration

open access: yesAdvanced Materials, EarlyView.
A flexible dielectric acoustic resonator patch enables MHz‐range ultrasound generation through resonance amplification without using piezoelectric materials. Conformal integration on a curved substrate allows efficient acoustic delivery to tissue‐mimicking environments.
Donyoung Kang   +7 more
wiley   +1 more source

Symbolic Abstractions for Quantum Protocol Verification [PDF]

open access: yes, 2019
Quantum protocols such as the BB84 Quantum Key Distribution protocol exchange qubits to achieve information-theoretic security guarantees. Many variants thereof were proposed, some of them being already deployed.
Hirschi, Lucca
core   +2 more sources

Light‐Induced Entropy for Secure Vision

open access: yesAdvanced Materials, EarlyView.
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo   +9 more
wiley   +1 more source

Economics of Cybersecurity Investment and Information Sharing: Firm Decision Making Under Policy Constraints

open access: yesSystems
With an increasing number of firms in cybersecurity information-sharing platforms, the potential cyber risks become a critical challenge during the exchanging of information.
Liurong Zhao   +3 more
doaj   +1 more source

A Nano‐Interception Strategy for Chronic Heart Failure: Prussian Blue Nanoparticles Disrupt Fibroblast‐Immune Communication via CCL2 Sequestration

open access: yesAdvanced Materials, EarlyView.
A nano‐interception strategy disrupts pathogenic fibroblast–macrophage crosstalk in chronic heart failure. Scalable Prussian blue nanoparticles selectively sequester CCL2 via ultrahigh‐affinity binding, preventing CCR2+ macrophage recruitment and breaking a key fibro‐inflammatory circuit. This approach demonstrates robust efficacy in murine and porcine
Bo Chen   +16 more
wiley   +1 more source

All‐Optical Reconfigurable Physical Unclonable Function for Sustainable Security

open access: yesAdvanced Materials, EarlyView.
An all‐optical reconfigurable physical unclonable function (PUF) is demonstrated using plasmonic coupling–induced sintering of optically trapped gold nanoparticles, where Brownian motion serves as a robust entropy source. The resulting optical PUF exhibits high encoding density, strong resistance to modeling attacks, and practical authentication ...
Jang‐Kyun Kwak   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy