Results 41 to 50 of about 95,453 (277)

Information-Theoretic Security Without an Honest Majority [PDF]

open access: yes, 2007
We present six multiparty protocols with information-theoretic security that tolerate an arbitrary number of corrupt participants. All protocols assume pairwise authentic private channels and a broadcast channel (in a single case, we require a simultaneous broadcast channel).
Broadbent, Anne, Tapp, Alain
openaire   +2 more sources

Mycobacterial cell division arrest and smooth‐to‐rough envelope transition using CRISPRi‐mediated genetic repression systems

open access: yesFEBS Open Bio, EarlyView.
CRISPRI‐mediated gene silencing and phenotypic exploration in nontuberculous mycobacteria. In this Research Protocol, we describe approaches to control, monitor, and quantitatively assess CRISPRI‐mediated gene silencing in M. smegmatis and M. abscessus model organisms.
Vanessa Point   +7 more
wiley   +1 more source

Virtual or In‐Person: Does It Matter? Comparing Pain, Function, Quality of Life, Self‐Efficacy, and Physical Function Outcomes of Virtual, Hybrid, and In‐Person Education and Exercise Program Participants

open access: yesArthritis Care &Research, EarlyView.
Objective This study aimed to determine if program format (in‐person, virtual, or hybrid) results in differences in 3‐month outcomes of pain, function, quality of life, self‐efficacy, and chair stands in a hip/knee osteoarthritis‐management program. Methods A secondary analysis of the Good Life with osteoArthritis in Denmark (GLA:D) Canada database was
Jill Van Damme   +7 more
wiley   +1 more source

Hopfield Neural Networks for Online Constrained Parameter Estimation With Time‐Varying Dynamics and Disturbances

open access: yesInternational Journal of Adaptive Control and Signal Processing, EarlyView.
This paper proposes two projector‐based Hopfield neural network (HNN) estimators for online, constrained parameter estimation under time‐varying data, additive disturbances, and slowly drifting physical parameters. The first is a constraint‐aware HNN that enforces linear equalities and inequalities (via slack neurons) and continuously tracks the ...
Miguel Pedro Silva
wiley   +1 more source

Experimental Guesswork with Quantum Side Information Using Twisted Light

open access: yesSensors, 2023
Guesswork is an information–theoretic quantity which can be seen as an alternate security criterion to entropy. Recent work has established the theoretical framework for guesswork in the presence of quantum side information, which we extend both ...
Vishal Katariya   +2 more
doaj   +1 more source

Trace Nickel Activated Biphasic Core‐CuOii/Shell‐CuOi Secondary Microspheres Enable Room Temperature Parts‐Per‐Trillion‐Level NO2 Detection

open access: yesAdvanced Engineering Materials, EarlyView.
An idea of designing novel sensors is proposed by creating appropriate Schottky barriers and vacancies between isomorphous Core‐CuOii/ Shell‐CuOi secondary microspheres and enhancing catalytic and spill‐over effects, and electronegativity via spontaneous biphasic separation, self‐assembly, and trace‐Ni‐doping.
Bala Ismail Adamu   +8 more
wiley   +1 more source

Two Semantics of Trust Management Language with Negation

open access: yesJournal of Telecommunications and Information Technology, 2013
The family of Role-based Trust management languages is used for representing security policies by defining a formalism, which uses credentials to handle trust in decentralized, distributed access control systems.
Anna Felkner
doaj   +1 more source

A Stronger Soft-Covering Lemma and Applications

open access: yes, 2015
Wyner's soft-covering lemma is a valuable tool for achievability proofs of information theoretic security, resolvability, channel synthesis, and source coding.
Cuff, Paul
core   +1 more source

Unique Performance Considerations for Printable Organic Semiconductor and Perovskite Radiation Detectors: Toward Consensus on Best Practice Evaluation

open access: yesAdvanced Functional Materials, EarlyView.
A lack of standard approaches for testing and reporting the performance of metal halide perovskites and organic semiconductor radiation detectors has resulted in inconsistent interpretation of performance parameters, impeding progress in the field. This Perspective recommends key metrics and experimental details, which are suggested for reporting in ...
Jessie A. Posar   +8 more
wiley   +1 more source

Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network

open access: yes, 2008
We introduce a simple, practical approach with probabilistic information-theoretic security to mitigate one of quantum key distribution's major limitations: the short maximum transmission distance (~200 km) possible with present day technology.
A. Herzberg   +9 more
core   +2 more sources

Home - About - Disclaimer - Privacy