Results 101 to 110 of about 95,453 (277)

Message Authentication over Noisy Channels

open access: yesEntropy, 2015
The essence of authentication is the transmission of unique and irreproducible information. In this paper, the authentication becomes a problem of the secure transmission of the secret key over noisy channels.
Fanfan Zheng   +4 more
doaj   +1 more source

Contributions to Information Theoretically Secure Communication

open access: yes, 2020
Secure communication ensures the integrity and confidentiality of communication between connected devices. An information-theoretic approach to secure communication gives the strongest confidentiality guarantee by assuming that the attacker has unlimited computing power.
openaire   +2 more sources

Electrochemical Abuse‐Driven Thermal Runaway in Lithium‐Ion Batteries: Evolution From Beginning‐of‐Life to End‐of‐Life

open access: yesAdvanced Functional Materials, EarlyView.
Electrochemical abuse transforms thermal runaway behavior in lithium‐ion batteries. Through systematic decoupling of degradation mechanisms, this study reveals that lithium plating lowers the onset temperature by 10 °C, electrolyte consumption delays high‐temperature reactions, and capacity fade reduces total heat generation. These mechanistic insights
San Hwang   +12 more
wiley   +1 more source

Strong Secrecy on a Class of Degraded Broadcast Channels Using Polar Codes

open access: yesEntropy, 2018
Asymptotic secrecy-capacity achieving polar coding schemes are proposed for the memoryless degraded broadcast channel under different reliability and secrecy requirements: layered decoding or layered secrecy.
Jaume del Olmo Alos   +1 more
doaj   +1 more source

In Materia Shaping of Randomness with a Standard Complementary Metal‐Oxide‐Semiconductor Transistor for Task‐Adaptive Entropy Generation

open access: yesAdvanced Functional Materials, EarlyView.
This study establishes a materials‐driven framework for entropy generation within standard CMOS technology. By electrically rebalancing gate‐oxide traps and Si‐channel defects in foundry‐fabricated FDSOI transistors, the work realizes in‐materia control of temporal correlation – achieving task adaptive entropy optimization for reinforcement learning ...
Been Kwak   +14 more
wiley   +1 more source

Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers

open access: yesFrontiers in Psychology, 2017
Game Theory is a common approach used to understand attacker and defender motives, strategies, and allocation of limited security resources. For example, many defense algorithms are based on game-theoretic solutions that conclude that randomization of ...
Frédéric Moisan, Cleotilde Gonzalez
doaj   +1 more source

High‐Resolution Characterization of Protein‐Conjugated, mRNA‐Loaded Lipid Nanoparticles by Analytical Ultracentrifugation

open access: yesAdvanced Functional Materials, EarlyView.
Lipid nanoparticles containing messenger RNA are characterized by sedimentation velocity analytical ultracentrifugation using UltraScan's new Custom Grid algorithm to provide multi‐dimensional distributions for partial specific volume (particle density), molar mass, sedimentation, diffusion, and hydrodynamic radius.
Sophia Bird   +8 more
wiley   +1 more source

Cold Quad‐Modal Nanocomplex for Precise and Quantitative In Vivo Stem Cell Tracking

open access: yesAdvanced Functional Materials, EarlyView.
Multimodal albumin–bismuth sulfide–superparamagnetic iron oxide (ABS) nanocomplexes are developed for stem cell tracking across four different imaging modalities: MRI, MPI, MSOT, and CT. Combining its flexibility with high sensitivity, this quad‐modal imaging agent enables a robust quantification of ABS‐labeled stem cells in vivo.
Ali Shakeri‐Zadeh   +4 more
wiley   +1 more source

Information-Theoretic Security or Covert Communication

open access: yes, 2018
Information-theoretic secrecy, in particular the wiretap channel formulation, provides protection against interception of a message by adversary Eve and has been widely studied in the last two decades. In contrast, covert communications under an analogous formulation provides protection against even the detection of the presence of the message by an ...
Forouzesh, Moslem   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy