Results 51 to 60 of about 49,336 (256)
A FeN4─O/Clu@NC‐0.1Ac catalyst containing atomically‐dispersed FeN4─O sites (medium‐spin Fe2+) and Fe clusters delivered a half‐wave potential of 0.89 V for ORR and an overpotential of 330 mV at 10 mA cm−2 for OER in 0.1 m KOH. When the catalyst was used in a rechargeable Zn–air battery, a power density of 284.5 mW cm−2 was achieved with excellent ...
Yongfang Zhou +8 more
wiley +1 more source
A Tracer Diffusion Study of Diverse Photo‐Ionic Phenomena in Strontium Titanate
Two strong interfacial photo‐ionic effects are demonstrated for the model system SrTiO3 through the application of isotope exchange experiments: UV illumination is found to enhance the oxygen surface exchange coefficient by several orders of magnitude and to depress the surface space‐charge potential substantially.
David M. Schwenkel +3 more
wiley +1 more source
Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging
Hardware obfuscation is widely used in practice to counteract reverse engineering. In recent years, low-level obfuscation via camouflaged gates has been increasingly discussed in the scientific community and industry.
Max Hoffmann, Christof Paar
doaj +3 more sources
This work reports the first gram‐scale solvothermal synthesis of ‘Rubik's cube’ nanoparticles—cubic, dendritic multicore structures with tuneable sizes and exceptional magnetic heating performance. Featuring iron oxide single‐domain character, with low coercivity fields, high magnetization, and strong MPI signals, they enable viscosity‐independent ...
Giusy M. R. Rizzo +12 more
wiley +1 more source
Key Generation for Hardware Obfuscation Using Strong PUFs
As a result of the increased use of contract foundries, intellectual property (IP) theft, excess production and reverse engineering are major concerns for the electronics and defense industries.
Md Shahed Enamul Quadir +1 more
doaj +1 more source
Obfuscapk: An open-source black-box obfuscation tool for Android apps
Obfuscapk is an open-source automatic obfuscation tool for Android apps that works in a black-box fashion (i.e., it does not need the app source code).
Simone Aonzo +3 more
doaj +1 more source
On the Activity Privacy of Blockchain for IoT
Security is one of the fundamental challenges in the Internet of Things (IoT) due to the heterogeneity and resource constraints of the IoT devices.
Dorri, Ali +3 more
core +1 more source
Mapping Nanoscale Buckling in Atomically Thin Cr2Ge2Te6
Atomic‐resolution STEM is used to resolve nanoscale buckling in monolayer Cr2Ge2Te₆. A noise‐robust image analysis reconstructs three‐dimensional lattice distortions from single plan‐view images, revealing pronounced defect‐driven nm‐scale out‐of‐plane buckling.
Amy Carl +20 more
wiley +1 more source
The main goal of obfuscation is to make software difficult to analyze. Although obfuscation is one useful method to protect programs, the ability to analyze malware is greatly reduced if used for malicious purposes.
Jae Hyuk Suk +2 more
doaj +1 more source
Obfuscating transparency? [PDF]
Several recent and prominent articles in Science and Nature deliberately mischaracterized the nature of genuine scientific evidence. Those articles take issue with the United States Environmental Protection Agency's recent proposal to structure its policies and rules only from studies with transparently published raw data.
Aschner +19 more
openaire +5 more sources

