Results 241 to 250 of about 14,130,174 (398)

Attack Modeling for Information Security and Survivability [PDF]

open access: green, 2001
Andrew P. Moore   +2 more
openalex   +1 more source

Emerging Trends of Information Security [PDF]

open access: yes, 2014
Gerasina, A.V.   +5 more
core  

Quantum Dots and Perovskites‐Based Physically Unclonable Functions for Binary and Ternary Keys via Optical‐to‐Electrical Conversion

open access: yesAdvanced Functional Materials, EarlyView.
This study investigates optoelectronic PUFs that improve on traditional optical and electrical PUFs. The absorber materials are randomly coated through spray coating, ligand exchange, and dynamic spin coating. Incident light generates wavelength‐dependent binary multikey and enhances security ternary keys, approaching near‐ideal inter‐ and intra ...
Hanseok Seo   +6 more
wiley   +1 more source

Rapid Diagnostics of Reconfigurable Intelligent Surfaces Using Space‐Time‐Coding Modulation

open access: yesAdvanced Functional Materials, EarlyView.
A fast reconfigurable‐intelligent‐surface (RIS) diagnostics method is proposed based on spatio‐temporal modulation with orthogonal codes. Theoretical analysis demonstrates a clear distinction in code channel power between normal and faulty elements. Simulations validate its feasibility under high fault ratios and varying receiving angles.
Yi Ning Zheng   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy