Results 71 to 80 of about 95,453 (277)

Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation

open access: yesIEEE Access
When using an insecure communication channel, the initial step involves authenticating the user (verifying the other party) to ensure the legitimacy of the communication partner, followed by an encrypted communication. Public key encryption-based digital
Keiichi Iwamura   +1 more
doaj   +1 more source

Cable Capacitance Attack against the KLJN Secure Key Exchange

open access: yesInformation, 2015
The security of the Kirchhoff-law-Johnson-(like)-noise (KLJN) key exchange system is based on the fluctuation-dissipation theorem of classical statistical physics.
Hsien-Pu Chen   +3 more
doaj   +1 more source

Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography

open access: yesEntropy, 2020
Private information retrieval (PIR) is a database query protocol that provides user privacy in that the user can learn a particular entry of the database of his interest but his query would be hidden from the data centre.
Wen Yu Kon, Charles Ci Wen Lim
doaj   +1 more source

Light‐Responsive Enzyme‐Loaded Nanoparticles for Tunable Adhesion and Mechanical Wound Contraction

open access: yesAdvanced Functional Materials, EarlyView.
This study presents a photoactivatable enzyme‐loaded mesoporous nanoparticle system (MPDA_PaTy) that enables light‐triggered tunable tissue adhesion and facilitates mechanical wound contraction. Controlled enzymatic crosslinking at tissue or hydrogel interfaces allows on‐demand adhesion.
Junghyeon Ko   +10 more
wiley   +1 more source

Method for assessing efficiency of the information security management system

open access: yesMATEC Web of Conferences, 2018
The article addresses the issue of efficiency assessment of the security system (SS) in terms of the Information Security Management System (information resources of the information system in an organization).
Kiedrowicz Maciej, Stanik Jerzy
doaj   +1 more source

High‐Spatiotemporal‐Resolution Transparent Thermoelectric Temperature Sensor Arrays Reveal Temperature‐Dependent Windows for Reversible Photothermal Neuromodulation

open access: yesAdvanced Functional Materials, EarlyView.
Thermoelectric temperature sensors are developed that directly measure heat changes during optical‐based neural stimulation with millisecond precision. The sensors reveal the temperature windows for safe reversible neural modulation: 1.4–4.5 °C enables reversible neural inhibition, while temperatures above 6.1 °C cause permanent thermal damage.
Junhee Lee   +9 more
wiley   +1 more source

In Situ Study of Resistive Switching in a Nitride‐Based Memristive Device

open access: yesAdvanced Functional Materials, EarlyView.
In situ TEM biasing experiment demonstrates the volatile I‐V characteristic of MIM lamella device. In situ STEM‐EELS Ti L2/L3 ratio maps provide direct evidence of the oxygen vacancies migrations under positive/negative electrical bias, which is critical for revealing the RS mechanism for the MIM lamella device.
Di Zhang   +19 more
wiley   +1 more source

A dynamic symmetric key generation at wireless link layer: information-theoretic perspectives

open access: yesEURASIP Journal on Wireless Communications and Networking
The expansion of wireless communication introduces security vulnerabilities, emphasizing the essential need for secure systems that prioritize confidentiality, integrity, and other key aspects of data protection. Since computational security acknowledges
David Samuel Bhatti   +3 more
doaj   +1 more source

Grain Boundary Space Charge Engineering of Solid Oxide Electrolytes: Model Thin Film Study

open access: yesAdvanced Functional Materials, EarlyView.
This study demonstrates unprecedented control of grain boundary electrical properties in solid electrolytes. Selective diffusion of cations through grain boundaries in thin films enables 12 orders of magnitude variation in ionic resistance, proving that systematic chemical modification of grain boundary electrical properties is feasible.
Thomas Defferriere   +5 more
wiley   +1 more source

Wireless Information-Theoretic Security in an Outdoor Topology with Obstacles: Theoretical Analysis and Experimental Measurements

open access: yesEURASIP Journal on Wireless Communications and Networking, 2011
This paper presents a Wireless Information-Theoretic Security (WITS) scheme, which has been recently introduced as a robust physical layer-based security solution, especially for infrastructureless networks.
Dagiuklas Tasos   +2 more
doaj  

Home - About - Disclaimer - Privacy