Results 51 to 60 of about 49,594 (257)
Bio‐Inspired Molecular Events in Poly(Ionic Liquids)
Originating from dipolar and polar inter‐ and intra‐chain interactions of the building blocks, the topologies and morphologies of poly(ionic liquids) (PIL) govern their nano‐ and micro‐processibility. Modulating the interactions of cation‐anion pairs with aliphatic dipolar components enables the tunability of properties, facilitated by “bottom‐up ...
Jiahui Liu, Marek W. Urban
wiley +1 more source
Key Generation for Hardware Obfuscation Using Strong PUFs
As a result of the increased use of contract foundries, intellectual property (IP) theft, excess production and reverse engineering are major concerns for the electronics and defense industries.
Md Shahed Enamul Quadir +1 more
doaj +1 more source
Nanothermometry in Living Cells: Physical Limits, Conceptual and Material Challenges
Heat and temperature are fundamental to life. When nanothermometers began probing regions as small as a living cell, they triggered controversial claims of large intracellular temperature gradients. We review physical constraints energy‐conservation, entropy production, thermodynamic fluctuations, and molecular dynamics.
Taras Plakhotnik
wiley +1 more source
Obfuscapk: An open-source black-box obfuscation tool for Android apps
Obfuscapk is an open-source automatic obfuscation tool for Android apps that works in a black-box fashion (i.e., it does not need the app source code).
Simone Aonzo +3 more
doaj +1 more source
With a charge‐ion coupling engineering strategy, a K+/vacancy disordered K0.5Mn0.8Co0.1Ti0.1O2 material has been designed. The targeted transition metal doping disrupts charge ordering and inducing K+/vacancy disordering, thereby enabling rapid K+ diffusion through interconnected channels and a stable solid‐solution reaction mechanism.
Yongfeng Jia +10 more
wiley +1 more source
The main goal of obfuscation is to make software difficult to analyze. Although obfuscation is one useful method to protect programs, the ability to analyze malware is greatly reduced if used for malicious purposes.
Jae Hyuk Suk +2 more
doaj +1 more source
On the Activity Privacy of Blockchain for IoT
Security is one of the fundamental challenges in the Internet of Things (IoT) due to the heterogeneity and resource constraints of the IoT devices.
Dorri, Ali +3 more
core +1 more source
AI‐Assisted Workflow for (Scanning) Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling. Abstract (Scanning) transmission electron microscopy ((S)TEM) has significantly advanced materials science but faces challenges in correlating precise atomic structure information with the functional properties of ...
Marc Botifoll +19 more
wiley +1 more source
Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging
Hardware obfuscation is widely used in practice to counteract reverse engineering. In recent years, low-level obfuscation via camouflaged gates has been increasingly discussed in the scientific community and industry.
Max Hoffmann, Christof Paar
doaj +3 more sources
Obfuscating transparency? [PDF]
Several recent and prominent articles in Science and Nature deliberately mischaracterized the nature of genuine scientific evidence. Those articles take issue with the United States Environmental Protection Agency's recent proposal to structure its policies and rules only from studies with transparently published raw data.
Aschner +19 more
openaire +5 more sources

