Results 61 to 70 of about 95,453 (277)

When the Hammer Meets the Nail: Multi-Server PIR for Database-Driven CRN with Location Privacy Assurance

open access: yes, 2017
We show that it is possible to achieve information theoretic location privacy for secondary users (SUs) in database-driven cognitive radio networks (CRNs) with an end-to-end delay less than a second, which is significantly better than that of the ...
Grissa, Mohamed   +2 more
core   +1 more source

Flux‐Regulated Crystallization of Perovskites Using Machine Learning‐Predicted Solvent Evaporation Rates for X‐Ray Detectors

open access: yesAdvanced Functional Materials, EarlyView.
By integrating machine learning into flux‐regulated crystallization (FRC), accurate prediction of solvent evaporation rates in real time, improving crystallization control and reducing crystal growth variability by over threefold, is achieved. This enhances the reproducibility and quality of perovskite single crystals, leading to reproducible ...
Tatiane Pretto   +8 more
wiley   +1 more source

Experimental measurement-device-independent quantum digital signatures

open access: yesNature Communications, 2017
Measurement-device-independent quantum digital signatures would allow a document to be signed and transferred with information-theoretic security. Here, the authors reach this goal using a reconfigurable quantum network where the central node can switch ...
G. L. Roberts   +9 more
doaj   +1 more source

Security in Cognitive Radio Networks

open access: yes, 2014
In this paper, we investigate the information-theoretic security by modeling a cognitive radio wiretap channel under quality-of-service (QoS) constraints and interference power limitations inflicted on primary users (PUs).
Akin, Sami
core   +1 more source

Photoswitching Conduction in Framework Materials

open access: yesAdvanced Functional Materials, EarlyView.
This mini‐review summarizes recent advances in state‐of‐the‐art proton and electron conduction in framework materials that can be remotely and reversibly switched on and off by light. It discusses the various photoswitching conduction mechanisms and the strategies employed to enhance photoswitched conductivity.
Helmy Pacheco Hernandez   +4 more
wiley   +1 more source

Fine-Tune LLMs for PLC Code Security: An Information-Theoretic Analysis

open access: yesMathematics
Programmable Logic Controllers (PLCs), widely used in industrial automation, are often programmed in IEC 61131-3 Structured Text (ST), which is prone to subtle logic vulnerabilities.
Ping Chen, Xiaojing Liu, Yi Wang
doaj   +1 more source

Optimal Weakly Secure Minimum Storage Regenerating Codes Scheme

open access: yesIEEE Access, 2019
In a distributed storage system, regenerating codes can be utilized to ensure data availability. This reduces the repair bandwidth but increases the risk of data eavesdropping on each node.
Jianchao Bian   +3 more
doaj   +1 more source

Polynomial-Time, Semantically-Secure Encryption Achieving the Secrecy Capacity [PDF]

open access: yes, 2011
In the wiretap channel setting, one aims to get information-theoretic privacy of communicated data based only on the assumption that the channel from sender to receiver is noisier than the one from sender to adversary. The secrecy capacity is the optimal
Bellare, Mihir, Tessaro, Stefano
core   +3 more sources

Information-theoretic security proof of differential-phase-shift quantum key distribution protocol based on complementarity

open access: yes, 2017
We show the information-theoretic security proof of the differential-phase-shift (DPS) quantum key distribution (QKD) protocol based on the complementarity approach [arXiv:0704.3661 (2007)].
Kato, Go   +4 more
core   +1 more source

Complex Cryptographic and User‐Centric Physically Unclonable Functions Enabled by Strain‐Sensitive Nanocrystals via Selective Ligand Exchange

open access: yesAdvanced Functional Materials, EarlyView.
This study investigates electromechanical PUFs that improve on traditional electric PUFs. The electron transport materials are coated randomly through selective ligand exchange. It produces multiple keys and a key with motion dependent on percolation and strain, and approaches almost ideal inter‐ and intra‐hamming distances.
Seungshin Lim   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy