Results 111 to 120 of about 2,332,315 (339)
Permutation Matrix Encryption Based Ultralightweight Secure RFID Scheme in Internet of Vehicles
Radio frequency identification (RFID) is a kind of non-contact automatic identification technology. The Internet of Vehicles (IoV) is a derivative of the Internet of Things (IoT), and RFID technology has become one of the key technologies of IoV.
Kai Fan +4 more
doaj +1 more source
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li +7 more
wiley +1 more source
Using single‐molecule whispering gallery mode sensors, neurotransmitter‐specific membrane binding signatures are measured that reveal intrinsically distinct interaction kinetics and orientations on a lipid membrane. Abstract Neurotransmitters (NTs) have traditionally been understood to act via aqueous‐phase receptor binding, but growing evidence ...
Thomas L. Derrien +4 more
wiley +1 more source
Solid Harmonic Wavelet Bispectrum for Image Analysis
The Solid Harmonic Wavelet Bispectrum (SHWB), a rotation‐ and translation‐invariant descriptor that captures higher‐order (phase) correlations in signals, is introduced. Combining wavelet scattering, bispectral analysis, and group theory, SHWB achieves interpretable, data‐efficient representations and demonstrates competitive performance across texture,
Alex Brown +3 more
wiley +1 more source
Increased concern about data privacy has prompted new and updated data protection regulations worldwide. However, there has been no rigorous way to test whether the practices mandated by these regulations actually align with the privacy norms of affected
Apthorpe, Noah +2 more
core
By integrating with machine learning (ML), hydrogel‐ and ionogel‐based soft sensors are gaining human brain‐like capabilities to perceive, learn, and predict. This review summarizes their advances, focusing on ML‐powered applications such as handwriting/gesture/object/motion/speech recognition, health monitoring, food detection, and beyond.
Wenqing He +8 more
wiley +1 more source
Security and Privacy issues based on Block chain for the Internet of Things(IoT) [PDF]
V. J. Chakravarthy
openalex +1 more source
Self-Imposed Violations of Privacy in Virtual Communities [PDF]
Virtual communities have grown in recent years due to the accessibility and ease of setting up web pages on communal Internet sites. Organizations, including companies that seek to hire new employees, often scan these web sites as part of their ...
John Warren
core
A Scoping Review of Nudges for Enhancing Agricultural Policy
ABSTRACT Following PRISMA guidelines, we conduct a scoping review on 18 empirical studies on nudging interventions for farmers in Europe and the USA. The evidence on the effectiveness of nudges is mixed. Some studies demonstrate positive outcomes, particularly when nudges are combined with other interventions; others report no effect or negative ...
Nadja El Benni +4 more
wiley +1 more source
The Internet of Things Connectivity Binge: What are the Implications? [PDF]
Despite wide concern about cyberattacks, outages and privacy violations, most experts believe the Internet of Things will continue to expand successfully the next few years, tying machines to machines and linking people to valuable resources, services ...
Janna Anderson, Lee Rainie
core

