Results 61 to 70 of about 49,594 (257)
Asymmetry of the Ferroelectric Phase Transition in BaTiO3
Phase transitions are typically assumed to behave identically in forward and reverse. This work shows that in the ferroelectric material barium titanate this is not true: heating drives an abrupt, first‐order jump, while cooling gives a smooth, continuous change.
Asaf Hershkovitz +14 more
wiley +1 more source
Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography
In some practical enciphering frameworks, operational constraints may require that a secret key be embedded into the cryptographic algorithm. Such implementations are referred to as White-Box Cryptography (WBC).
Claude Carlet +2 more
doaj +1 more source
Light‐Induced Entropy for Secure Vision
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo +9 more
wiley +1 more source
A note on the concept of obfuscation.
In this paper we address the issue of defining security of program obfuscation. We argue that requirements to obfuscated programs may be different and are dependent on potential applications. Therefore three distinct models are suggested for studying the
N.P. Varnovsky
doaj
A Framework to Quantify the Quality of Source Code Obfuscation
Malicious reverse engineering of software has served as a valuable technique for attackers to infringe upon and steal intellectual property. We can employ obfuscation techniques to protect against such attackers as useful tools to safeguard software ...
Hongjoo Jin +4 more
doaj +1 more source
Correlated Charge Transport in an Organic Coulomb Glass
ABSTRACT Advances in the development of organic field‐effect transistors (OFETs), electrically gated organic semiconductors (EGOFETs), and organic electrochemical transistors (OECTs) allow for the operation of these devices at very high charge‐carrier densities, where Coulomb interactions between carriers can be expected to become significant.
Magdalena Sophie Dörfler +3 more
wiley +1 more source
ABSTRACT Piezocatalytic hydrogen evolution enables the conversion of mechanical energy into chemical fuels, but its efficiency is constrained by a trade‐off between piezoelectric polarization and electronic conductivity. Strong piezoelectric polarization is essential for sufficient driving force, yet highly polar materials typically suffer from poor ...
Chongyan Hao +13 more
wiley +1 more source
Common Program Similarity Metric Method for Anti-Obfuscation
Program similarity metrics, especially malware similarity metrics, have long been an area of active research. However, code obfuscation techniques bring many challenges to similarity analysis.
Xiaochuan Zhang +2 more
doaj +1 more source
On the Anonymization of Differentially Private Location Obfuscation
Obfuscation techniques in location-based services (LBSs) have been shown useful to hide the concrete locations of service users, whereas they do not necessarily provide the anonymity.
duchi, montazeri, yang
core +1 more source
Why Is the Mechanism Underlying the Chiral‐Induced Selectivity Effect Still Challenging?
The chiral‐induced spin selectivity (CISS) effect is observed in many experimental configurations and for different materials. However, there are theoretical challenges in attempting to explain those results. A qualitative framework for explaining all the results is presented.
Ron Naaman, Yossi Paltiel
wiley +1 more source

