Results 81 to 90 of about 95,937 (276)

Wireless Information-Theoretic Security in an Outdoor Topology with Obstacles: Theoretical Analysis and Experimental Measurements

open access: yesEURASIP Journal on Wireless Communications and Networking, 2011
This paper presents a Wireless Information-Theoretic Security (WITS) scheme, which has been recently introduced as a robust physical layer-based security solution, especially for infrastructureless networks.
Dagiuklas Tasos   +2 more
doaj  

Bioinspired Adaptive Sensors: A Review on Current Developments in Theory and Application

open access: yesAdvanced Materials, EarlyView.
This review comprehensively summarizes the recent progress in the design and fabrication of sensory‐adaptation‐inspired devices and highlights their valuable applications in electronic skin, wearable electronics, and machine vision. The existing challenges and future directions are addressed in aspects such as device performance optimization ...
Guodong Gong   +12 more
wiley   +1 more source

Information-Theoretic Security with Asymmetries

open access: yes
sponsorship: This work was supported in part by the Research Council KU Leuven: GOA TENSE (C16/15/058). Tim Beyne is supported by a junior postdoctoral fellowship from the Research Foundation -Flanders (FWO) with reference number 1274724N. The authors thank the CRYPTO 2024 reviewers for their valuable comments and suggestions. The authors would like to
Beyne, Tim, Chen, Yu Long
openaire   +2 more sources

Strain Engineering of Magnetoresistance and Magnetic Anisotropy in CrSBr

open access: yesAdvanced Materials, EarlyView.
Biaxial compressive strain significantly enhances magnetoresistance and critical saturation fields in thin flakes of the 2D magnet CrSBr, along all three crystallographic axes. First‐principles calculations link these effects to strain‐induced increases in exchange interactions and magnetic anisotropy.
Eudomar Henríquez‐Guerra   +19 more
wiley   +1 more source

Joint power control for untrusted relay cooperation-based confidential communication

open access: yesTongxin xuebao, 2014
The scenario that multiple cell-edge mobile stations (MS) all without direct-links to the base station (BS) but have confidential messages in the uplink in the presence of untrusted relay (UR) cooperation was considered.In order to implement the secure ...
Wen-jiang FENG   +3 more
doaj   +2 more sources

Real Estate Equity Investments and the Institutional Lender: Nothing Ventured, Nothing Gained [PDF]

open access: yes, 1971
We consider a setup in which the channel from Alice to Bob is less noisy than the channel from Eve to Bob. We show that there exist encoding and decoding which accomplish error correction and authentication simultaneously; that is, Bob is able to ...
Roegge, Frank E.   +2 more
core   +2 more sources

Experimental demonstration of long-distance continuous-variable quantum key distribution

open access: yes, 2012
Distributing secret keys with information-theoretic security is arguably one of the most important achievements of the field of quantum information processing and communications. The rapid progress in this field has enabled quantum key distribution (QKD)
Diamanti, Eleni   +4 more
core   +3 more sources

Artificial Intelligence‐Assisted Workflow for Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling

open access: yesAdvanced Materials, EarlyView.
AI‐Assisted Workflow for (Scanning) Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling. Abstract (Scanning) transmission electron microscopy ((S)TEM) has significantly advanced materials science but faces challenges in correlating precise atomic structure information with the functional properties of ...
Marc Botifoll   +19 more
wiley   +1 more source

Crystal Growth Engineering for Dendrite‐Free Zinc Metal Plating

open access: yesAdvanced Materials, EarlyView.
This research employed the rare‐earth ion dysprosium (Dy) to modulate aqueous zinc (Zn) metal plating. Integrated multiscale experiments and computational modeling unveiled the preferential adsorption of Dy on specific crystal facets, which activated screw dislocation‐driven Zn growth.
Guifang Zeng   +10 more
wiley   +1 more source

Development of structure of a subsystem of information security of the automated system

open access: yesMATEC Web of Conferences, 2017
Approach to synthesis of modular structure of a subsystem of information security of the automated process control system is offered. The task has been solved on the basis of a set-theoretic notation with elements of the graph theory.
Bakhracheva Yulia
doaj   +1 more source

Home - About - Disclaimer - Privacy