Results 61 to 70 of about 23,485 (319)

Semi-Trusted Mixer Based Privacy Preserving Distributed Data Mining for Resource Constrained Devices [PDF]

open access: yes, 2010
In this paper a homomorphic privacy preserving association rule mining algorithm is proposed which can be deployed in resource constrained devices (RCD).
Kaosar, Md. Golam, Yi, Xun
core   +1 more source

Near‐Infrared Organic Photovoltaic Electrodes for Subretinal Neurostimulation

open access: yesAdvanced Functional Materials, EarlyView.
Organic photovoltaic electrodes based on the D18:Y6 blend enable precise and light‐controlled activation of retinal ganglion cells in a degenerating retina. NIR Light‐driven activation of retinal ganglion cells, tunable stimulation parameters, and biocompatibility with human retinal organoids highlight their potential for next‐generation prosthetics ...
Andrea Corna   +10 more
wiley   +1 more source

ANALYSIS OF THE CHARACTERISTICS OF INTERNATIONAL STANDARD ALGORITHMS «LIGHTWEIGHT CRYPTOGRAPHY» – ISO/IEC 29192-3:2012

open access: yesInformatika, 2016
The data on the characteristics of international standard algorithms «lightweight cryptography» while application in hardware implementation based on microchips of FPGA are provided.
A. S. Poljakov, V. E. Samsonov
doaj  

Lightweight cryptographic algorithm based on trigonometry, dedicated on encryption of short messages

open access: yesTASK Quarterly
The IoT technology is currently used in many areas and marked by growing popularity. On the one hand, the IoT makes our lives easier, on the other hand, it presents challenges in terms of security and privacy protection.
Wiesław Maleszewski
doaj   +1 more source

Lightweight Quantum Encryption for Secure Transmission of Power Data in Smart Grid

open access: yesIEEE Access, 2019
The rise of the smart grid, which applies the Internet and smart metering technologies to the power system, results in massive, heterogeneous power data and a large number of attacks on the smart grid and causes great threats to the confidentiality and ...
Yuancheng Li, Pan Zhang, Rong Huang
doaj   +1 more source

In Materia Shaping of Randomness with a Standard Complementary Metal‐Oxide‐Semiconductor Transistor for Task‐Adaptive Entropy Generation

open access: yesAdvanced Functional Materials, EarlyView.
This study establishes a materials‐driven framework for entropy generation within standard CMOS technology. By electrically rebalancing gate‐oxide traps and Si‐channel defects in foundry‐fabricated FDSOI transistors, the work realizes in‐materia control of temporal correlation – achieving task adaptive entropy optimization for reinforcement learning ...
Been Kwak   +14 more
wiley   +1 more source

SLIM: A Lightweight Block Cipher for Internet of Health Things

open access: yesIEEE Access, 2020
Nowadays, there is a strong demand for increasing the protection of resource-constrained devices such as Radio frequency identification (RFID) systems. Current cryptographic algorithms are sufficient for high-resource desktop computers.
Bassam Aboushosha   +4 more
doaj   +1 more source

Broadband, Flexible, Skin‐Compatible Carbon Dots/Graphene Photodetectors for Wearable Applications

open access: yesAdvanced Functional Materials, EarlyView.
Broadband, flexible photodetectors integrating nitrogen‐rich carbon dots with single‐layer graphene on plastic substrates are demonstrated. A biocompatible chitosan–glycerol electrolyte enables efficient low‐voltage gating and on‐skin operation. The devices exhibit ultraviolet‐to‐near‐infrared response, mechanical robustness under bending, and verified
Nouha Loudhaief   +20 more
wiley   +1 more source

Secure multi-party computation for analytics deployed as a lightweight web application [PDF]

open access: yes, 2016
We describe the definition, design, implementation, and deployment of a secure multi-party computation protocol and web application. The protocol and application allow groups of cooperating parties with minimal expertise and no specialized resources to ...
Bestavros, Azer   +4 more
core   +1 more source

Smart Ticket Protection: An Architecture for Cyber-Protecting Physical Tickets Using Digitally Signed Random Pattern Markers

open access: yes, 2018
In order to counter forgeries of tickets for public transport or mass events, a method to validate them, using printed unique random pattern markers was developed. These markers themselves are unforgeable by their physically random distribution.
Marksteiner, Stefan
core   +1 more source

Home - About - Disclaimer - Privacy