Results 61 to 70 of about 95,453 (278)
We show that it is possible to achieve information theoretic location privacy for secondary users (SUs) in database-driven cognitive radio networks (CRNs) with an end-to-end delay less than a second, which is significantly better than that of the ...
Grissa, Mohamed +2 more
core +1 more source
By integrating machine learning into flux‐regulated crystallization (FRC), accurate prediction of solvent evaporation rates in real time, improving crystallization control and reducing crystal growth variability by over threefold, is achieved. This enhances the reproducibility and quality of perovskite single crystals, leading to reproducible ...
Tatiane Pretto +8 more
wiley +1 more source
Experimental measurement-device-independent quantum digital signatures
Measurement-device-independent quantum digital signatures would allow a document to be signed and transferred with information-theoretic security. Here, the authors reach this goal using a reconfigurable quantum network where the central node can switch ...
G. L. Roberts +9 more
doaj +1 more source
Security in Cognitive Radio Networks
In this paper, we investigate the information-theoretic security by modeling a cognitive radio wiretap channel under quality-of-service (QoS) constraints and interference power limitations inflicted on primary users (PUs).
Akin, Sami
core +1 more source
Photoswitching Conduction in Framework Materials
This mini‐review summarizes recent advances in state‐of‐the‐art proton and electron conduction in framework materials that can be remotely and reversibly switched on and off by light. It discusses the various photoswitching conduction mechanisms and the strategies employed to enhance photoswitched conductivity.
Helmy Pacheco Hernandez +4 more
wiley +1 more source
Fine-Tune LLMs for PLC Code Security: An Information-Theoretic Analysis
Programmable Logic Controllers (PLCs), widely used in industrial automation, are often programmed in IEC 61131-3 Structured Text (ST), which is prone to subtle logic vulnerabilities.
Ping Chen, Xiaojing Liu, Yi Wang
doaj +1 more source
Polynomial-Time, Semantically-Secure Encryption Achieving the Secrecy Capacity [PDF]
In the wiretap channel setting, one aims to get information-theoretic privacy of communicated data based only on the assumption that the channel from sender to receiver is noisier than the one from sender to adversary. The secrecy capacity is the optimal
Bellare, Mihir, Tessaro, Stefano
core +3 more sources
We show the information-theoretic security proof of the differential-phase-shift (DPS) quantum key distribution (QKD) protocol based on the complementarity approach [arXiv:0704.3661 (2007)].
Kato, Go +4 more
core +1 more source
This study investigates electromechanical PUFs that improve on traditional electric PUFs. The electron transport materials are coated randomly through selective ligand exchange. It produces multiple keys and a key with motion dependent on percolation and strain, and approaches almost ideal inter‐ and intra‐hamming distances.
Seungshin Lim +7 more
wiley +1 more source
When using an insecure communication channel, the initial step involves authenticating the user (verifying the other party) to ensure the legitimacy of the communication partner, followed by an encrypted communication. Public key encryption-based digital
Keiichi Iwamura +1 more
doaj +1 more source

