Results 81 to 90 of about 95,453 (277)
High‐entropy perovskite nanofibers serve as robust and active bifunctional air electrodes in reversible protonic ceramic electrochemical cells. Their compositional complexity stabilizes the lattice, enriches oxygen vacancies, and accelerates surface exchange.
Hyeonggeun Kim +4 more
wiley +1 more source
Joint power control for untrusted relay cooperation-based confidential communication
The scenario that multiple cell-edge mobile stations (MS) all without direct-links to the base station (BS) but have confidential messages in the uplink in the presence of untrusted relay (UR) cooperation was considered.In order to implement the secure ...
Wen-jiang FENG +3 more
doaj +2 more sources
Information-Theoretic Security with Asymmetries
sponsorship: This work was supported in part by the Research Council KU Leuven: GOA TENSE (C16/15/058). Tim Beyne is supported by a junior postdoctoral fellowship from the Research Foundation -Flanders (FWO) with reference number 1274724N. The authors thank the CRYPTO 2024 reviewers for their valuable comments and suggestions. The authors would like to
Beyne, Tim, Chen, Yu Long
openaire +2 more sources
Vacuum‐based deposition is promising for perovskite solar cells to be successfully commercialized. However, co‐evaporation, the most common vapor phase deposition technique, suffers from very low deposition rates. In this work, we reveal that high deposition rates can lead to carbon flakes depositing into the perovskite absorber layers due to material ...
Thomas Feeney +13 more
wiley +1 more source
This study demonstrates a Maya blue‐inspired hybrid solar evaporator using commercial black acrylic paint, achieving 98% solar‐thermal conversion efficiency and 2.39 kg m−2 h−1 water evaporation rate through a durable, hydrophilic organic–inorganic structure that enables scalable, cost‐effective desalination and wastewater purification.
Dao Thi Dung +5 more
wiley +1 more source
Development of structure of a subsystem of information security of the automated system
Approach to synthesis of modular structure of a subsystem of information security of the automated process control system is offered. The task has been solved on the basis of a set-theoretic notation with elements of the graph theory.
Bakhracheva Yulia
doaj +1 more source
With the rapid development of information technologies, security violations in online social networks (OSN) have emerged as a critical issue. Traditional technical and organizational approaches do not consider economic factors, which are increasingly ...
Guang Zhu, Hu Liu, Mining Feng
doaj +1 more source
Symbolic Abstractions for Quantum Protocol Verification [PDF]
Quantum protocols such as the BB84 Quantum Key Distribution protocol exchange qubits to achieve information-theoretic security guarantees. Many variants thereof were proposed, some of them being already deployed.
Hirschi, Lucca
core +2 more sources
This work presents a continuous linear gradient catalyst layer design, a general strategy for improving membrane electrode assemblies across electrochemical devices. Fabricated via a dual‐nozzle spray coating method, the architecture controls the Pt/carbon ratio, ionomer content and ionomer type across the catalyst layer, enhancing proton conduction ...
Shangwei Zhou +15 more
wiley +1 more source
Efficient Privacy Preserving Distributed Clustering Based on Secret Sharing [PDF]
In this paper, we propose a privacy preserving distributed clustering protocol for horizontally partitioned data based on a very efficient homomorphic additive secret sharing scheme.
Savas, Erkay, Savaş, Erkay
core

