Results 101 to 110 of about 95,937 (276)

Message Authentication over Noisy Channels

open access: yesEntropy, 2015
The essence of authentication is the transmission of unique and irreproducible information. In this paper, the authentication becomes a problem of the secure transmission of the secret key over noisy channels.
Fanfan Zheng   +4 more
doaj   +1 more source

Multifunctional Bio‐Based Packaging for Perishable Foods: Structural Design, Scalable Fabrication, and Versatile Applications

open access: yesAdvanced Materials, EarlyView.
An overview of design principles and scalable fabrication strategies for multifunctional bio‐based packaging. Radiative cooling films, modified‐atmosphere films/membranes, active antimicrobial/antioxidant platforms, intelligent optical/electrochemical labels, and superhydrophobic surfaces are co‐engineered from material chemistry to mesoscale structure
Lei Zhang   +6 more
wiley   +1 more source

Contributions to Information Theoretically Secure Communication

open access: yes, 2020
Secure communication ensures the integrity and confidentiality of communication between connected devices. An information-theoretic approach to secure communication gives the strongest confidentiality guarantee by assuming that the attacker has unlimited computing power.
openaire   +2 more sources

Short‐Wavelength Infrared Imaging with Organic Photodetectors Based on Non‐Fullerene Acceptors with Detection above 1200 nm

open access: yesAdvanced Materials, EarlyView.
Solution‐processed organic photodetectors (OPDs) based on two novel low band gap non‐fullerene acceptors BZIC‐2F and BZIC‐2Cl, when blended with common polymer donor P3HT, extend detection range beyond 1200 nm with superior performance, rivaling costly inorganic sensors and past literature.
Zhuoran Qiao   +18 more
wiley   +1 more source

Efficient DPF-based error-detecting information-theoretic private information retrieval over rings

open access: yesCybersecurity
Authenticated private information retrieval (APIR) is the state-of-the-art error-detecting private information retrieval (ED-PIR), using Distributed Point Functions (DPFs) for subpolynomial complexity and privacy.
Pengzhen Ke   +3 more
doaj   +1 more source

Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers

open access: yesFrontiers in Psychology, 2017
Game Theory is a common approach used to understand attacker and defender motives, strategies, and allocation of limited security resources. For example, many defense algorithms are based on game-theoretic solutions that conclude that randomization of ...
Frédéric Moisan, Cleotilde Gonzalez
doaj   +1 more source

Wavelength‐Dependent 3D Printing: Introducing 3D Printed Action Plots

open access: yesAdvanced Materials, EarlyView.
Photochemical action plots – wavelength‐dependent reactivity studies of photoactive molecules – can show a significant mismatch between the peak of photochemical action and maximum absorbance in photopolymerization systems in solution. How this knowledge translates to photocuring in light‐driven 3D printing remains unexplored.
Federica Sbordone   +8 more
wiley   +1 more source

Strong Secrecy on a Class of Degraded Broadcast Channels Using Polar Codes

open access: yesEntropy, 2018
Asymptotic secrecy-capacity achieving polar coding schemes are proposed for the memoryless degraded broadcast channel under different reliability and secrecy requirements: layered decoding or layered secrecy.
Jaume del Olmo Alos   +1 more
doaj   +1 more source

A Super‐Adhesive Air Filter With Capillarity‐Mediated Spontaneous Particle Absorption via Dynamic Bond Exchange

open access: yesAdvanced Materials, EarlyView.
We address the inherently weak particle adhesion of conventional air filters by coating a dynamically crosslinked adhesive layer that delivers capillarity‐driven strong adhesion and particle absorption mediated by dynamic bond exchange. The resulting enhancement in particle adhesion enables efficient ultrafast (up to 20 m s−1) and omnidirectional ...
Junyong Park   +11 more
wiley   +1 more source

Home - About - Disclaimer - Privacy