Results 91 to 100 of about 3,238,646 (347)

Information-Theoretic Security for the Masses [PDF]

open access: yes, 2013
We combine interactive zero-knowledge protocols and weak physical layer randomness properties to construct a protocol which allows bootstrapping an IT-secure and PF-secure channel from a memorizable shared secret.
Nikitin, Oleksandr
core  

Improving Surface Quality of Titanium Electrodeposition from a Deep Eutectic Solvent with Organic and Inorganic Additives

open access: yesAdvanced Engineering Materials, EarlyView.
Herein, the electroplating of titanium from an organic solvent, ethaline, is shown. Polymer additives are shown to smooth the roughness of the film, and small molecule additives are shown to produce a near‐mirror finish to the deposited metal. Titanium electroreduction is desired for a variety of medical, electronic, and bonding applications but has ...
Steven Livers   +7 more
wiley   +1 more source

3D Bioprinting of Thick Adipose Tissues with Integrated Vascular Hierarchies

open access: yesAdvanced Functional Materials, Volume 35, Issue 12, March 18, 2025.
An advanced 3D bioprinting technique is used here to create thick adipose tissues with a central, vessel and extensive branching. The construct is made using alginate, gelatin and collagen‐based bioinks. Flow through the complex vessel network is demonstrated as well as its successful integration with a femoral artery following implantation in a rat ...
Idit Goldfracht   +5 more
wiley   +1 more source

Advanced ENF Region Classification Using UniTS-SinSpec: A Novel Approach Integrating Sinusoidal Activation Function and Spectral Attention

open access: yesApplied Sciences
The electric network frequency (ENF), often referred to as the industrial heartbeat, plays a crucial role in the power system. In recent years, it has found applications in multimedia evidence identification for court proceedings and audio–visual ...
Yujin Li   +4 more
doaj   +1 more source

Information Security Service Culture - Information Security for End-users

open access: yes, 2012
JUCS - Journal of Universal Computer Science Volume Nr.
Rastogi,Rahul, Solms,Rossouw
openaire   +2 more sources

3D Printed Ultra‐Fast Plastic Scintillators Based on Perovskite‐Photocurable Polymer Composite

open access: yesAdvanced Functional Materials, Volume 35, Issue 12, March 18, 2025.
The demand for radiation detection is increasing in a number of fields, including high‐energy physics, medical imaging, and homeland security. This study serves to demonstrate the potential for the fabrication of fast perovskite‐based scintillators with complex shapes via stereolithographic additive manufacturing, representing a new path toward the ...
Antonella Giuri   +16 more
wiley   +1 more source

Pulmonary Vessel Segmentation via Stage-Wise Convolutional Networks With Orientation-Based Region Growing Optimization

open access: yesIEEE Access, 2018
For large-scale medical images, automatic pulmonary vessel segmentation is a fundamental and essential research for various pulmonary disease diagnoses.
Yajun Xu   +3 more
doaj   +1 more source

National Security in the Information Age [PDF]

open access: yes, 2012
The information environment has been changing right along with the broader security environment. Today, the information environment connects almost everyone, almost everywhere, almost instantaneously.
Brooks, Rosa
core   +1 more source

Structurally Colored Physically Unclonable Functions with Ultra‐Rich and Stable Encoding Capacity

open access: yesAdvanced Functional Materials, Volume 35, Issue 12, March 18, 2025.
This study reports a design strategy for generating bright‐field resolvable physically unclonable functions with extremely rich encoding capacity coupled with outstanding thermal and chemical stability. The optical response emerges from thickness‐dependent structural color formation in ZnO features, which are fabricated by physical vapor deposition ...
Abidin Esidir   +8 more
wiley   +1 more source

Inter-Cloud Data Security Framework to Build Trust Based on Compliance with Controls

open access: yesIET Information Security
Prospects of cloud computing as a technology that optimizes resources, reduces complexity, and provides cost-effective solutions to its consumers are well established.
Syed Imran Akhtar   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy