Results 121 to 130 of about 72,952 (289)
In vitro cancer models are advantageous for studying important processes such as tumorigenesis, cancer growth, invasion, and metastasis. The complexity and biological relevance increase depending on the model structure, organization, and composition of materials and cells.
Kyndra S. Higgins +2 more
wiley +1 more source
Analysis Of Message Authentication In Turbo Coded Halftoned Images Using Exit Charts
Andhe Dharani +2 more
openalex +2 more sources
Cumulative Message Authentication Codes for Resource-Constrained IoT Networks [PDF]
He Li +3 more
openalex +1 more source
Structurally Colored Physically Unclonable Functions with Ultra‐Rich and Stable Encoding Capacity
This study reports a design strategy for generating bright‐field resolvable physically unclonable functions with extremely rich encoding capacity coupled with outstanding thermal and chemical stability. The optical response emerges from thickness‐dependent structural color formation in ZnO features, which are fabricated by physical vapor deposition ...
Abidin Esidir +8 more
wiley +1 more source
Integrity (I) codes: message integrity protection and authentication over insecure channels
Mario Čagalj +5 more
openalex +3 more sources
A spin group (SG)‐based mechanism is proposed to realize a single pair of Weyl points. PT‐symmetric nodal lines (NLs) persist under T‐breaking, protected by the combination of SG and P symmetry. When considering spin‐orbit coupling, the SG‐protected NL will split into Weyl points, which will also induce anomalous transport phenomena arising from ...
Shifeng Qian +6 more
wiley +1 more source
Unmanned aerial vehicles (UAVs) play a critical role in various fields, including logistics, agriculture, and rescue operations. Effective identity authentication and key agreement schemes are vital for UAV networks to combat threats.
Tao Xia +5 more
doaj +1 more source
From a database of 170 pentagonal 2D materials, 4 candidates exhibiting altermagnetic ordering are screened. Furthermore, the spin‐splitting and unconventional boundary states in the pentagonal 2D altermagnetic monolayer MnS2 are investigated. A MnS2‐based altermagnetic tunneling junction is designed and, through ab initio quantum transport simulations,
Jianhua Wang +8 more
wiley +1 more source
Research and Implementation of Secure Upgrade Method for Embedded Control Software
In order to respond to challenges encountered in the software upgrade of embedded systems due to frequent demand changes and technological iterations, this paper presents the design of a secure software upgrade methodology and process.
CHEN Junbo, ZOU Junyang, ZHANG Tianyu
doaj

