Results 71 to 80 of about 95,453 (277)
When using an insecure communication channel, the initial step involves authenticating the user (verifying the other party) to ensure the legitimacy of the communication partner, followed by an encrypted communication. Public key encryption-based digital
Keiichi Iwamura +1 more
doaj +1 more source
Cable Capacitance Attack against the KLJN Secure Key Exchange
The security of the Kirchhoff-law-Johnson-(like)-noise (KLJN) key exchange system is based on the fluctuation-dissipation theorem of classical statistical physics.
Hsien-Pu Chen +3 more
doaj +1 more source
Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography
Private information retrieval (PIR) is a database query protocol that provides user privacy in that the user can learn a particular entry of the database of his interest but his query would be hidden from the data centre.
Wen Yu Kon, Charles Ci Wen Lim
doaj +1 more source
Light‐Responsive Enzyme‐Loaded Nanoparticles for Tunable Adhesion and Mechanical Wound Contraction
This study presents a photoactivatable enzyme‐loaded mesoporous nanoparticle system (MPDA_PaTy) that enables light‐triggered tunable tissue adhesion and facilitates mechanical wound contraction. Controlled enzymatic crosslinking at tissue or hydrogel interfaces allows on‐demand adhesion.
Junghyeon Ko +10 more
wiley +1 more source
Method for assessing efficiency of the information security management system
The article addresses the issue of efficiency assessment of the security system (SS) in terms of the Information Security Management System (information resources of the information system in an organization).
Kiedrowicz Maciej, Stanik Jerzy
doaj +1 more source
Thermoelectric temperature sensors are developed that directly measure heat changes during optical‐based neural stimulation with millisecond precision. The sensors reveal the temperature windows for safe reversible neural modulation: 1.4–4.5 °C enables reversible neural inhibition, while temperatures above 6.1 °C cause permanent thermal damage.
Junhee Lee +9 more
wiley +1 more source
In Situ Study of Resistive Switching in a Nitride‐Based Memristive Device
In situ TEM biasing experiment demonstrates the volatile I‐V characteristic of MIM lamella device. In situ STEM‐EELS Ti L2/L3 ratio maps provide direct evidence of the oxygen vacancies migrations under positive/negative electrical bias, which is critical for revealing the RS mechanism for the MIM lamella device.
Di Zhang +19 more
wiley +1 more source
A dynamic symmetric key generation at wireless link layer: information-theoretic perspectives
The expansion of wireless communication introduces security vulnerabilities, emphasizing the essential need for secure systems that prioritize confidentiality, integrity, and other key aspects of data protection. Since computational security acknowledges
David Samuel Bhatti +3 more
doaj +1 more source
Grain Boundary Space Charge Engineering of Solid Oxide Electrolytes: Model Thin Film Study
This study demonstrates unprecedented control of grain boundary electrical properties in solid electrolytes. Selective diffusion of cations through grain boundaries in thin films enables 12 orders of magnitude variation in ionic resistance, proving that systematic chemical modification of grain boundary electrical properties is feasible.
Thomas Defferriere +5 more
wiley +1 more source
This paper presents a Wireless Information-Theoretic Security (WITS) scheme, which has been recently introduced as a robust physical layer-based security solution, especially for infrastructureless networks.
Dagiuklas Tasos +2 more
doaj

