Results 191 to 200 of about 3,475,621 (326)

Methods of Measuring Information Security Risks [PDF]

open access: yes, 2013
Grigorieva, Victoria   +2 more
core  

Grain Boundary Space Charge Engineering of Solid Oxide Electrolytes: Model Thin Film Study

open access: yesAdvanced Functional Materials, EarlyView.
This study demonstrates unprecedented control of grain boundary electrical properties in solid electrolytes. Selective diffusion of cations through grain boundaries in thin films enables 12 orders of magnitude variation in ionic resistance, proving that systematic chemical modification of grain boundary electrical properties is feasible.
Thomas Defferriere   +5 more
wiley   +1 more source

Metasurface-enabled optical encryption and steganography with enhanced information security. [PDF]

open access: yesNanophotonics
Xing W   +9 more
europepmc   +1 more source

A pattern-based method for establishing a cloud-specific information security management system

open access: green, 2013
Kristian Beckers   +4 more
openalex   +2 more sources

Charge‐Induced Morphing Gels for Bioinspired Actuation

open access: yesAdvanced Functional Materials, EarlyView.
This study introduces a novel electroactive actuation mechanism that enables the gel material to generate substantial and reversible shape‐changing while preserving topological and isochoric (volumetric) equivalence. The resultant morphing behaviors can mimic the movements of muscle‐driven organelles in nature, including cilia‐like beating and ...
Ciqun Xu   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy