Results 61 to 70 of about 95,937 (276)
A Distortion Based Approach for Protecting Inferences
Eavesdropping attacks in inference systems aim to learn not the raw data, but the system inferences to predict and manipulate system actions. We argue that conventional information security measures can be ambiguous on the adversary's estimation ...
Agarwal, Gaurav Kumar +3 more
core +1 more source
Adaptive Hydrogels With Spatiotemporal Stiffening Using pH‐Modulating Enzymes
The chemomechanical coupling in an adaptive hydrogel is studied to further the development of adaptive hydrogels. This coupling is achieved by embedding a pH‐modulating enzyme in a pH‐responsive hydrogel. The enzymatic reaction can be triggered locally, which generates a pH‐decreasing wave throughout the system, increasing the crosslinking density and ...
Natascha Gray +3 more
wiley +1 more source
Experimental measurement-device-independent quantum digital signatures
Measurement-device-independent quantum digital signatures would allow a document to be signed and transferred with information-theoretic security. Here, the authors reach this goal using a reconfigurable quantum network where the central node can switch ...
G. L. Roberts +9 more
doaj +1 more source
information-theoretic security, conflict resolution, expander graphs [PDF]
: Motivated by the challenging task of designing “secure ” vote storage mechanisms, we study information storage mechanisms that operate in extremely hostile environments.
Gil Segev +5 more
core +1 more source
Game Theory Meets Network Security: A Tutorial at ACM CCS
The increasingly pervasive connectivity of today's information systems brings up new challenges to security. Traditional security has accomplished a long way toward protecting well-defined goals such as confidentiality, integrity, availability, and ...
Chen J. +8 more
core +1 more source
Robust Polymer Hydrogels Improve Electric‐Fish‐Inspired Batteries
ABSTRACT Electric‐fish‐inspired hydrogel batteries based on ion‐concentration gradients offer an attractive route to soft power sources; however, the poor mechanical properties of existing hydrogels limit device assembly and performance. Here, we report poly(ethylene glycol) methyl ether acrylate hydrogels that enable ion‐gradient batteries composed of
Nick Zahnd +5 more
wiley +1 more source
When using an insecure communication channel, the initial step involves authenticating the user (verifying the other party) to ensure the legitimacy of the communication partner, followed by an encrypted communication. Public key encryption-based digital
Keiichi Iwamura +1 more
doaj +1 more source
Continuum Percolation in the Intrinsically Secure Communications Graph
The intrinsically secure communications graph (iS-graph) is a random graph which captures the connections that can be securely established over a large-scale network, in the presence of eavesdroppers.
Pinto, Pedro C., Win, Moe Z.
core +1 more source
Atomic Layer Deposition in Transistors and Monolithic 3D Integration
Transistors are fundamental building blocks of modern electronics. This review summarizes recent progress in atomic layer deposition (ALD) for the synthesis of two‐dimensional (2D) metal oxides and transition‐metal dichalcogenides (TMDCs), with particular emphasis on their enabling role in monolithic three‐dimensional (M3D) integration for next ...
Yue Liu +5 more
wiley +1 more source
Fine-Tune LLMs for PLC Code Security: An Information-Theoretic Analysis
Programmable Logic Controllers (PLCs), widely used in industrial automation, are often programmed in IEC 61131-3 Structured Text (ST), which is prone to subtle logic vulnerabilities.
Ping Chen, Xiaojing Liu, Yi Wang
doaj +1 more source

