Results 71 to 80 of about 95,453 (278)
Optimal Weakly Secure Minimum Storage Regenerating Codes Scheme
In a distributed storage system, regenerating codes can be utilized to ensure data availability. This reduces the repair bandwidth but increases the risk of data eavesdropping on each node.
Jianchao Bian +3 more
doaj +1 more source
Information-Theoretic Security of Cryptographic Channels [PDF]
Information and Communications Security 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24–26, 2020 ...
Fischlin, Marc +2 more
openaire +2 more sources
Light‐Responsive Enzyme‐Loaded Nanoparticles for Tunable Adhesion and Mechanical Wound Contraction
This study presents a photoactivatable enzyme‐loaded mesoporous nanoparticle system (MPDA_PaTy) that enables light‐triggered tunable tissue adhesion and facilitates mechanical wound contraction. Controlled enzymatic crosslinking at tissue or hydrogel interfaces allows on‐demand adhesion.
Junghyeon Ko +10 more
wiley +1 more source
Cable Capacitance Attack against the KLJN Secure Key Exchange
The security of the Kirchhoff-law-Johnson-(like)-noise (KLJN) key exchange system is based on the fluctuation-dissipation theorem of classical statistical physics.
Hsien-Pu Chen +3 more
doaj +1 more source
Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography
Private information retrieval (PIR) is a database query protocol that provides user privacy in that the user can learn a particular entry of the database of his interest but his query would be hidden from the data centre.
Wen Yu Kon, Charles Ci Wen Lim
doaj +1 more source
Thermoelectric temperature sensors are developed that directly measure heat changes during optical‐based neural stimulation with millisecond precision. The sensors reveal the temperature windows for safe reversible neural modulation: 1.4–4.5 °C enables reversible neural inhibition, while temperatures above 6.1 °C cause permanent thermal damage.
Junhee Lee +9 more
wiley +1 more source
Method for assessing efficiency of the information security management system
The article addresses the issue of efficiency assessment of the security system (SS) in terms of the Information Security Management System (information resources of the information system in an organization).
Kiedrowicz Maciej, Stanik Jerzy
doaj +1 more source
In Situ Study of Resistive Switching in a Nitride‐Based Memristive Device
In situ TEM biasing experiment demonstrates the volatile I‐V characteristic of MIM lamella device. In situ STEM‐EELS Ti L2/L3 ratio maps provide direct evidence of the oxygen vacancies migrations under positive/negative electrical bias, which is critical for revealing the RS mechanism for the MIM lamella device.
Di Zhang +19 more
wiley +1 more source
A dynamic symmetric key generation at wireless link layer: information-theoretic perspectives
The expansion of wireless communication introduces security vulnerabilities, emphasizing the essential need for secure systems that prioritize confidentiality, integrity, and other key aspects of data protection. Since computational security acknowledges
David Samuel Bhatti +3 more
doaj +1 more source
Grain Boundary Space Charge Engineering of Solid Oxide Electrolytes: Model Thin Film Study
This study demonstrates unprecedented control of grain boundary electrical properties in solid electrolytes. Selective diffusion of cations through grain boundaries in thin films enables 12 orders of magnitude variation in ionic resistance, proving that systematic chemical modification of grain boundary electrical properties is feasible.
Thomas Defferriere +5 more
wiley +1 more source

