Results 61 to 70 of about 23,485 (319)
Semi-Trusted Mixer Based Privacy Preserving Distributed Data Mining for Resource Constrained Devices [PDF]
In this paper a homomorphic privacy preserving association rule mining algorithm is proposed which can be deployed in resource constrained devices (RCD).
Kaosar, Md. Golam, Yi, Xun
core +1 more source
Near‐Infrared Organic Photovoltaic Electrodes for Subretinal Neurostimulation
Organic photovoltaic electrodes based on the D18:Y6 blend enable precise and light‐controlled activation of retinal ganglion cells in a degenerating retina. NIR Light‐driven activation of retinal ganglion cells, tunable stimulation parameters, and biocompatibility with human retinal organoids highlight their potential for next‐generation prosthetics ...
Andrea Corna +10 more
wiley +1 more source
The data on the characteristics of international standard algorithms «lightweight cryptography» while application in hardware implementation based on microchips of FPGA are provided.
A. S. Poljakov, V. E. Samsonov
doaj
Lightweight cryptographic algorithm based on trigonometry, dedicated on encryption of short messages
The IoT technology is currently used in many areas and marked by growing popularity. On the one hand, the IoT makes our lives easier, on the other hand, it presents challenges in terms of security and privacy protection.
Wiesław Maleszewski
doaj +1 more source
Lightweight Quantum Encryption for Secure Transmission of Power Data in Smart Grid
The rise of the smart grid, which applies the Internet and smart metering technologies to the power system, results in massive, heterogeneous power data and a large number of attacks on the smart grid and causes great threats to the confidentiality and ...
Yuancheng Li, Pan Zhang, Rong Huang
doaj +1 more source
This study establishes a materials‐driven framework for entropy generation within standard CMOS technology. By electrically rebalancing gate‐oxide traps and Si‐channel defects in foundry‐fabricated FDSOI transistors, the work realizes in‐materia control of temporal correlation – achieving task adaptive entropy optimization for reinforcement learning ...
Been Kwak +14 more
wiley +1 more source
SLIM: A Lightweight Block Cipher for Internet of Health Things
Nowadays, there is a strong demand for increasing the protection of resource-constrained devices such as Radio frequency identification (RFID) systems. Current cryptographic algorithms are sufficient for high-resource desktop computers.
Bassam Aboushosha +4 more
doaj +1 more source
Broadband, Flexible, Skin‐Compatible Carbon Dots/Graphene Photodetectors for Wearable Applications
Broadband, flexible photodetectors integrating nitrogen‐rich carbon dots with single‐layer graphene on plastic substrates are demonstrated. A biocompatible chitosan–glycerol electrolyte enables efficient low‐voltage gating and on‐skin operation. The devices exhibit ultraviolet‐to‐near‐infrared response, mechanical robustness under bending, and verified
Nouha Loudhaief +20 more
wiley +1 more source
Secure multi-party computation for analytics deployed as a lightweight web application [PDF]
We describe the definition, design, implementation, and deployment of a secure multi-party computation protocol and web application. The protocol and application allow groups of cooperating parties with minimal expertise and no specialized resources to ...
Bestavros, Azer +4 more
core +1 more source
In order to counter forgeries of tickets for public transport or mass events, a method to validate them, using printed unique random pattern markers was developed. These markers themselves are unforgeable by their physically random distribution.
Marksteiner, Stefan
core +1 more source

