Results 71 to 80 of about 95,937 (277)
Collective attacks and unconditional security in continuous variable quantum key distribution
We present here an information theoretic study of Gaussian collective attacks on the continuous variable key distribution protocols based on Gaussian modulation of coherent states.
Grosshans, Frederic
core +1 more source
Information-Theoretic Security of Cryptographic Channels [PDF]
Information and Communications Security 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24–26, 2020 ...
Fischlin, Marc +2 more
openaire +2 more sources
Developing recyclable materials for magnetic robotics that combine rapid response and self‐healing properties is challenging. Hence, this study focuses on the integration of magnetothermal nanoparticles into a dynamic sorbitol‐based vitrimer, a recyclable composite capable of remote actuation and self‐healing by magnetic heating.
Maria Weißpflog +3 more
wiley +1 more source
Optimal Weakly Secure Minimum Storage Regenerating Codes Scheme
In a distributed storage system, regenerating codes can be utilized to ensure data availability. This reduces the repair bandwidth but increases the risk of data eavesdropping on each node.
Jianchao Bian +3 more
doaj +1 more source
Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography
Private information retrieval (PIR) is a database query protocol that provides user privacy in that the user can learn a particular entry of the database of his interest but his query would be hidden from the data centre.
Wen Yu Kon, Charles Ci Wen Lim
doaj +1 more source
Laser‐Assisted Processing and Modification of Bioactive Glasses: A Review
Laser technologies provide powerful tools to process and transform bioactive glasses for advanced biomedical applications. This review discusses laser‐matter interaction mechanisms, laser surface engineering, and laser‐assisted fabrication of scaffolds and nanofibers.
Antonio Riveiro +8 more
wiley +1 more source
Cable Capacitance Attack against the KLJN Secure Key Exchange
The security of the Kirchhoff-law-Johnson-(like)-noise (KLJN) key exchange system is based on the fluctuation-dissipation theorem of classical statistical physics.
Hsien-Pu Chen +3 more
doaj +1 more source
Myocardial infarction often leads to pathological remodelling and ventricular dilatation, key features of HFrEF. This study introduces a personalized, 3D‐printed cardiac restraint device (CARD) printed using rationally designed inks displaying the requested printability and mechanical properties.
Nicola Mansour +6 more
wiley +1 more source
A dynamic symmetric key generation at wireless link layer: information-theoretic perspectives
The expansion of wireless communication introduces security vulnerabilities, emphasizing the essential need for secure systems that prioritize confidentiality, integrity, and other key aspects of data protection. Since computational security acknowledges
David Samuel Bhatti +3 more
doaj +1 more source
Method for assessing efficiency of the information security management system
The article addresses the issue of efficiency assessment of the security system (SS) in terms of the Information Security Management System (information resources of the information system in an organization).
Kiedrowicz Maciej, Stanik Jerzy
doaj +1 more source

