Results 121 to 130 of about 72,952 (289)

3D In Vitro Models of Breast Cancer: Current Challenges and Future Prospects Toward Recapitulating the Microenvironment and Mimicking Key Processes

open access: yesAdvanced Biology, EarlyView.
In vitro cancer models are advantageous for studying important processes such as tumorigenesis, cancer growth, invasion, and metastasis. The complexity and biological relevance increase depending on the model structure, organization, and composition of materials and cells.
Kyndra S. Higgins   +2 more
wiley   +1 more source

Cumulative Message Authentication Codes for Resource-Constrained IoT Networks [PDF]

open access: green, 2022
He Li   +3 more
openalex   +1 more source

Structurally Colored Physically Unclonable Functions with Ultra‐Rich and Stable Encoding Capacity

open access: yesAdvanced Functional Materials, Volume 35, Issue 12, March 18, 2025.
This study reports a design strategy for generating bright‐field resolvable physically unclonable functions with extremely rich encoding capacity coupled with outstanding thermal and chemical stability. The optical response emerges from thickness‐dependent structural color formation in ZnO features, which are fabricated by physical vapor deposition ...
Abidin Esidir   +8 more
wiley   +1 more source

Integrity (I) codes: message integrity protection and authentication over insecure channels

open access: gold, 2006
Mario Čagalj   +5 more
openalex   +3 more sources

Single Pair of Weyl Points Evolve From Spin Group‐Protected Nodal Line in Half‐Metallic Ferromagnet V3S4

open access: yesAdvanced Functional Materials, EarlyView.
A spin group (SG)‐based mechanism is proposed to realize a single pair of Weyl points. PT‐symmetric nodal lines (NLs) persist under T‐breaking, protected by the combination of SG and P symmetry. When considering spin‐orbit coupling, the SG‐protected NL will split into Weyl points, which will also induce anomalous transport phenomena arising from ...
Shifeng Qian   +6 more
wiley   +1 more source

A Quantum-Resistant Identity Authentication and Key Agreement Scheme for UAV Networks Based on Kyber Algorithm

open access: yesDrones
Unmanned aerial vehicles (UAVs) play a critical role in various fields, including logistics, agriculture, and rescue operations. Effective identity authentication and key agreement schemes are vital for UAV networks to combat threats.
Tao Xia   +5 more
doaj   +1 more source

Pentagonal 2D Altermagnets: Material Screening and Altermagnetic Tunneling Junction Device Application

open access: yesAdvanced Functional Materials, EarlyView.
From a database of 170 pentagonal 2D materials, 4 candidates exhibiting altermagnetic ordering are screened. Furthermore, the spin‐splitting and unconventional boundary states in the pentagonal 2D altermagnetic monolayer MnS2 are investigated. A MnS2‐based altermagnetic tunneling junction is designed and, through ab initio quantum transport simulations,
Jianhua Wang   +8 more
wiley   +1 more source

Research and Implementation of Secure Upgrade Method for Embedded Control Software

open access: yesKongzhi Yu Xinxi Jishu
In order to respond to challenges encountered in the software upgrade of embedded systems due to frequent demand changes and technological iterations, this paper presents the design of a secure software upgrade methodology and process.
CHEN Junbo, ZOU Junyang, ZHANG Tianyu
doaj  

Home - About - Disclaimer - Privacy