Results 101 to 110 of about 95,937 (276)
Message Authentication over Noisy Channels
The essence of authentication is the transmission of unique and irreproducible information. In this paper, the authentication becomes a problem of the secure transmission of the secret key over noisy channels.
Fanfan Zheng +4 more
doaj +1 more source
An overview of design principles and scalable fabrication strategies for multifunctional bio‐based packaging. Radiative cooling films, modified‐atmosphere films/membranes, active antimicrobial/antioxidant platforms, intelligent optical/electrochemical labels, and superhydrophobic surfaces are co‐engineered from material chemistry to mesoscale structure
Lei Zhang +6 more
wiley +1 more source
Contributions to Information Theoretically Secure Communication
Secure communication ensures the integrity and confidentiality of communication between connected devices. An information-theoretic approach to secure communication gives the strongest confidentiality guarantee by assuming that the attacker has unlimited computing power.
openaire +2 more sources
Solution‐processed organic photodetectors (OPDs) based on two novel low band gap non‐fullerene acceptors BZIC‐2F and BZIC‐2Cl, when blended with common polymer donor P3HT, extend detection range beyond 1200 nm with superior performance, rivaling costly inorganic sensors and past literature.
Zhuoran Qiao +18 more
wiley +1 more source
Efficient DPF-based error-detecting information-theoretic private information retrieval over rings
Authenticated private information retrieval (APIR) is the state-of-the-art error-detecting private information retrieval (ED-PIR), using Distributed Point Functions (DPFs) for subpolynomial complexity and privacy.
Pengzhen Ke +3 more
doaj +1 more source
Game Theory is a common approach used to understand attacker and defender motives, strategies, and allocation of limited security resources. For example, many defense algorithms are based on game-theoretic solutions that conclude that randomization of ...
Frédéric Moisan, Cleotilde Gonzalez
doaj +1 more source
Wavelength‐Dependent 3D Printing: Introducing 3D Printed Action Plots
Photochemical action plots – wavelength‐dependent reactivity studies of photoactive molecules – can show a significant mismatch between the peak of photochemical action and maximum absorbance in photopolymerization systems in solution. How this knowledge translates to photocuring in light‐driven 3D printing remains unexplored.
Federica Sbordone +8 more
wiley +1 more source
Strong Secrecy on a Class of Degraded Broadcast Channels Using Polar Codes
Asymptotic secrecy-capacity achieving polar coding schemes are proposed for the memoryless degraded broadcast channel under different reliability and secrecy requirements: layered decoding or layered secrecy.
Jaume del Olmo Alos +1 more
doaj +1 more source
We address the inherently weak particle adhesion of conventional air filters by coating a dynamically crosslinked adhesive layer that delivers capillarity‐driven strong adhesion and particle absorption mediated by dynamic bond exchange. The resulting enhancement in particle adhesion enables efficient ultrafast (up to 20 m s−1) and omnidirectional ...
Junyong Park +11 more
wiley +1 more source
Securing Distributed Wireless Edge Networks Via Information-Theoretic Security Approaches
Yingbin Liang
doaj +1 more source

