Results 71 to 80 of about 22,603 (282)
Secure multi-party computation for analytics deployed as a lightweight web application [PDF]
We describe the definition, design, implementation, and deployment of a secure multi-party computation protocol and web application. The protocol and application allow groups of cooperating parties with minimal expertise and no specialized resources to ...
Bestavros, Azer +4 more
core +1 more source
Cryptanalysis of two mutual authentication protocols for low-cost RFID
Radio Frequency Identification (RFID) is appearing as a favorite technology for automated identification, which can be widely applied to many applications such as e-passport, supply chain management and ticketing.
Alaghband, Mahdi R. +2 more
core +1 more source
Synthesizer: Chemistry‐Aware Machine Learning for Precision Control of Nanocrystal Growth
A new, data‐efficient approach to CsPbBr3 nanocrystal optimization combines chemical and physical insights with a Gaussian Process‐based machine learning algorithm. Implementation of the “Synthesizer” enables nm‐precise tuning of the emission wavelength while reducing experimental load in optimizing peak narrowness and photoluminescence quantum yield ...
Nina A. Henke +11 more
wiley +1 more source
On the Sustainability of Lightweight Cryptography Based on PUFs Implemented on NAND Flash Memories Using Programming Disturbances [PDF]
Nikolaos Athanasios Anagnostopoulos +6 more
openalex +1 more source
Hydrogels demonstrate material properties that mimic the mechanical and chemical environments of biological tissues. Yet, they face challenges during their integration into 3D interfaces. By identifying a class of thermoplastic hydrogels, a strategy is developed to pattern hydrogels in thermally drawn fibers.
Changhoon Sung +13 more
wiley +1 more source
Lightweight Compression with Encryption Based on Asymmetric Numeral Systems
Data compression combined with effective encryption is a common requirement of data storage and transmission. Low cost of these operations is often a high priority in order to increase transmission speed and reduce power usage.
Duda Jarosław, Niemiec Marcin
doaj +1 more source
Developments in Nanopatterning of Graphene; Toward Direct Writing
Overview of principal direct‐write graphene patterning methodologies including focused electron beam induced deposition (FEBID), laser induced graphitisation (LIG), focused ion beam (FIB), scanning tunneling microscopy (STM) and atomic force microscopy (AFM) Abstract Graphene, with its exceptional electronic, mechanical, and thermal properties, remains
Szymon Abrahamczyk +4 more
wiley +1 more source
Cryptography in the Cloud Computing: the Current State and Logical Tasks
The current state of the cloud computing (CC) information security is analysed and logical problems of storage and data transmission security at CC are allocated.
Sergey Nikolaevich Kyazhin +1 more
doaj
CephArmor: A Lightweight Cryptographic Interface for Secure High-Performance Ceph Storage Systems [PDF]
Fatemeh Khoda Parast +4 more
openalex +1 more source
Adaptive Twisting Metamaterials
This work introduces torque‐controlled twisting metamaterials as a transformative platform for adaptive crashworthiness. By combining multiscale predictive modeling with experimental validation on additively manufactured gyroids, it demonstrates tunable stiffness, collapse stress, and energy absorption.
Mattia Utzeri +6 more
wiley +1 more source

