Results 41 to 50 of about 186,948 (311)
On the Security of an Efficient and Robust Certificateless Signature Scheme for IIoT Environments
As the progress of digitization in industrial society, large amount of production data are outsourced to the cloud server in order to reduce data management costs. Nevertheless, how to ensure the outsourced data integrality, validity, and availability is
Wenjie Yang+3 more
doaj +1 more source
While the idea that securitization is a relational, continuous process is not new, it remains unclear how this reconceptualization can be applied to systematically study the emergence of security threats at scale. To address this problem, this chapter offers an innovative adaptation of Discourse Network Analysis (Leifeld, 2016) to develop a formalized ...
openaire +1 more source
Laser remelting of a CrMnFeCoNi high‐entropy alloy reveals that optimal chemical homogenization occurs between 30 and 40 J·mm−2. Within this range, elemental segregation is reduced by over 30% compared to the as‐cast state. The study establishes this window as a fast, effective alternative to prolonged annealing for achieving uniform elemental ...
Ajay Talbot+5 more
wiley +1 more source
A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing
Blockchain is commonly employed in access control to provide safe medical data exchange because of the characteristics of decentralization, nontamperability, and traceability.
Canling Wang+8 more
doaj +1 more source
In underground industries, practitioners frequently employ argots to communicate discreetly and evade surveillance by investigative agencies. Proposing an innovative approach using word vectors and large language models, we aim to decipher and understand
Mingfeng Li+3 more
doaj +1 more source
This paper studies the robust resource allocation to improve the robustness against the channel state information (CSI) uncertainties for energy harvesting (EH)-aided device-to-device (D2D) communication underlaying cellular network.
Yanbo Ma+4 more
doaj +1 more source
3D Bioprinting of Thick Adipose Tissues with Integrated Vascular Hierarchies
An advanced 3D bioprinting technique is used here to create thick adipose tissues with a central, vessel and extensive branching. The construct is made using alginate, gelatin and collagen‐based bioinks. Flow through the complex vessel network is demonstrated as well as its successful integration with a femoral artery following implantation in a rat ...
Idit Goldfracht+5 more
wiley +1 more source
Securing personal area networks
We consider the applicability of ID-based cryptography to providing security within a personal area network (PAN). An initialisation process appropriate for use within a PAN is proposed, and a detailed comparison between the ID-based approach and a more conventional PKI (public key infrastructure) approach is given.
Garefalakis, Theo, Mitchell, Chris J
openaire +11 more sources
Structurally Colored Physically Unclonable Functions with Ultra‐Rich and Stable Encoding Capacity
This study reports a design strategy for generating bright‐field resolvable physically unclonable functions with extremely rich encoding capacity coupled with outstanding thermal and chemical stability. The optical response emerges from thickness‐dependent structural color formation in ZnO features, which are fabricated by physical vapor deposition ...
Abidin Esidir+8 more
wiley +1 more source
Carbon Nanotube 3D Integrated Circuits: From Design to Applications
As Moore's law approaches its physical limits, carbon nanotube (CNT) 3D integrated circuits (ICs) emerge as a promising alternative due to the miniaturization, high mobility, and low power consumption. CNT 3D ICs in optoelectronics, memory, and monolithic ICs are reviewed while addressing challenges in fabrication, design, and integration.
Han‐Yang Liu+3 more
wiley +1 more source