Results 211 to 220 of about 23,485 (319)
Two-Party Threshold Private Set Intersection Protocols from Lightweight Cryptographic Primitives [PDF]
Shengnan Zhao +4 more
openalex +1 more source
Fast bootstrap and reliable readout using hidden references for DNA data storage
This study provides a bootstrap readout framework for DNA data storage based on multiple‐fold hidden references. We employ a multi‐stage alignment and error correction strategy, transforming the de novo readout into a resequencing‐like workflow. Correlation to the hidden watermark reference identifies low‐error‐rate reads, and bit‐wise consensus ...
Weigang Chen +6 more
wiley +1 more source
SRAM based Gaussian noise generation for post quantum cryptography. [PDF]
Kim MS, Jeon SB, Kim S.
europepmc +1 more source
A tunable microwave absorption metamaterial inspired by moths evading bat detection
Electromagnetic radiation in the current environment has become complex and uncontrollable due to the advancement of wireless technology. Inspired by the moth surface cilia to bend and evade bat sonar detection, our work introduces a metamaterial incorporating broadband and tunable microwave absorption properties combined with deep learning algorithms.
Yijie Liu +13 more
wiley +1 more source
Omega deoxyribonucleic acid cryptography key-based authentication. [PDF]
Chuah CW, Tey J, Mohamad KM.
europepmc +1 more source
Symmetrical cryptographic algorithms in the lightweight internet of things
Akshaya Dhingra +2 more
openalex +2 more sources
ABSTRACT Brain age is an emerging concept that reflects complex, time‐dependent changes in brain structure, identifying departures from expected neurodevelopmental patterns. In the developing brain, accurate MRI‐based age estimation is a quantitative biomarker for detecting atypical neurodevelopment, facilitating early diagnosis, guiding clinical ...
Hosna Asma ull +3 more
wiley +1 more source
Enhanced EAADE: a quantum-resilient and privacy-preserving authentication protocol for secure data exchange in vehicular social networks. [PDF]
Alrashdi R +7 more
europepmc +1 more source
Secure Data Aggregation for Wireless Sensor Network using Lightweight Cryptography
Srinivasan Ananthanarayanan Bragadeesh +1 more
openalex +2 more sources
Modern AI systems can now synthesize coherent multimedia experiences, generating video and audio directly from text prompts. These unified frameworks represent a rapid shift toward controllable and synchronized content creation. From early neural architectures to transformer and diffusion paradigms, this paper contextualizes the ongoing evolution of ...
Charles Ding, Rohan Bhowmik
wiley +1 more source

