Results 81 to 90 of about 95,937 (276)
This paper presents a Wireless Information-Theoretic Security (WITS) scheme, which has been recently introduced as a robust physical layer-based security solution, especially for infrastructureless networks.
Dagiuklas Tasos +2 more
doaj
Bioinspired Adaptive Sensors: A Review on Current Developments in Theory and Application
This review comprehensively summarizes the recent progress in the design and fabrication of sensory‐adaptation‐inspired devices and highlights their valuable applications in electronic skin, wearable electronics, and machine vision. The existing challenges and future directions are addressed in aspects such as device performance optimization ...
Guodong Gong +12 more
wiley +1 more source
Information-Theoretic Security with Asymmetries
sponsorship: This work was supported in part by the Research Council KU Leuven: GOA TENSE (C16/15/058). Tim Beyne is supported by a junior postdoctoral fellowship from the Research Foundation -Flanders (FWO) with reference number 1274724N. The authors thank the CRYPTO 2024 reviewers for their valuable comments and suggestions. The authors would like to
Beyne, Tim, Chen, Yu Long
openaire +2 more sources
Strain Engineering of Magnetoresistance and Magnetic Anisotropy in CrSBr
Biaxial compressive strain significantly enhances magnetoresistance and critical saturation fields in thin flakes of the 2D magnet CrSBr, along all three crystallographic axes. First‐principles calculations link these effects to strain‐induced increases in exchange interactions and magnetic anisotropy.
Eudomar Henríquez‐Guerra +19 more
wiley +1 more source
Joint power control for untrusted relay cooperation-based confidential communication
The scenario that multiple cell-edge mobile stations (MS) all without direct-links to the base station (BS) but have confidential messages in the uplink in the presence of untrusted relay (UR) cooperation was considered.In order to implement the secure ...
Wen-jiang FENG +3 more
doaj +2 more sources
Real Estate Equity Investments and the Institutional Lender: Nothing Ventured, Nothing Gained [PDF]
We consider a setup in which the channel from Alice to Bob is less noisy than the channel from Eve to Bob. We show that there exist encoding and decoding which accomplish error correction and authentication simultaneously; that is, Bob is able to ...
Roegge, Frank E. +2 more
core +2 more sources
Experimental demonstration of long-distance continuous-variable quantum key distribution
Distributing secret keys with information-theoretic security is arguably one of the most important achievements of the field of quantum information processing and communications. The rapid progress in this field has enabled quantum key distribution (QKD)
Diamanti, Eleni +4 more
core +3 more sources
AI‐Assisted Workflow for (Scanning) Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling. Abstract (Scanning) transmission electron microscopy ((S)TEM) has significantly advanced materials science but faces challenges in correlating precise atomic structure information with the functional properties of ...
Marc Botifoll +19 more
wiley +1 more source
Crystal Growth Engineering for Dendrite‐Free Zinc Metal Plating
This research employed the rare‐earth ion dysprosium (Dy) to modulate aqueous zinc (Zn) metal plating. Integrated multiscale experiments and computational modeling unveiled the preferential adsorption of Dy on specific crystal facets, which activated screw dislocation‐driven Zn growth.
Guifang Zeng +10 more
wiley +1 more source
Development of structure of a subsystem of information security of the automated system
Approach to synthesis of modular structure of a subsystem of information security of the automated process control system is offered. The task has been solved on the basis of a set-theoretic notation with elements of the graph theory.
Bakhracheva Yulia
doaj +1 more source

