Results 61 to 70 of about 50,028 (274)
Printer watermark obfuscation [PDF]
Most color laser printers manufactured and sold today add "invisible" information to make it easier to determine when a particular document was printed and exactly which printer was used. Some manufacturers have acknowledged the existence of the tracking information in their documentation while others have not.
Maya Embar +2 more
openaire +1 more source
Correlated Charge Transport in an Organic Coulomb Glass
ABSTRACT Advances in the development of organic field‐effect transistors (OFETs), electrically gated organic semiconductors (EGOFETs), and organic electrochemical transistors (OECTs) allow for the operation of these devices at very high charge‐carrier densities, where Coulomb interactions between carriers can be expected to become significant.
Magdalena Sophie Dörfler +3 more
wiley +1 more source
ABSTRACT Piezocatalytic hydrogen evolution enables the conversion of mechanical energy into chemical fuels, but its efficiency is constrained by a trade‐off between piezoelectric polarization and electronic conductivity. Strong piezoelectric polarization is essential for sufficient driving force, yet highly polar materials typically suffer from poor ...
Chongyan Hao +13 more
wiley +1 more source
Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging
Hardware obfuscation is widely used in practice to counteract reverse engineering. In recent years, low-level obfuscation via camouflaged gates has been increasingly discussed in the scientific community and industry.
Max Hoffmann, Christof Paar
doaj +3 more sources
The energetic offset between the donor and the acceptor components in organic photoactive layers is central to the tradeoff between photovoltage and photocurrent losses. This Perspective covers the most important issues surrounding this topic in non‐fullerene acceptor blends, from the difficulty of accurately determining state energies and driving ...
Dieter Neher, Manasi Pranav
wiley +1 more source
Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography
In some practical enciphering frameworks, operational constraints may require that a secret key be embedded into the cryptographic algorithm. Such implementations are referred to as White-Box Cryptography (WBC).
Claude Carlet +2 more
doaj +1 more source
Why Is the Mechanism Underlying the Chiral‐Induced Selectivity Effect Still Challenging?
The chiral‐induced spin selectivity (CISS) effect is observed in many experimental configurations and for different materials. However, there are theoretical challenges in attempting to explain those results. A qualitative framework for explaining all the results is presented.
Ron Naaman, Yossi Paltiel
wiley +1 more source
Heuristic Authorship Obfuscation [PDF]
Authorship verification is the task of determining whether two texts were written by the same author. We deal with the adversary task, called authorship obfuscation: preventing verification by altering a to-be-obfuscated text. Our new obfuscation approach (1) models writing style difference as the Jensen-Shannon distance between the character n-gram ...
Janek Bevendorff +3 more
openaire +1 more source
A Framework to Quantify the Quality of Source Code Obfuscation
Malicious reverse engineering of software has served as a valuable technique for attackers to infringe upon and steal intellectual property. We can employ obfuscation techniques to protect against such attackers as useful tools to safeguard software ...
Hongjoo Jin +4 more
doaj +1 more source
On the Activity Privacy of Blockchain for IoT
Security is one of the fundamental challenges in the Internet of Things (IoT) due to the heterogeneity and resource constraints of the IoT devices.
Dorri, Ali +3 more
core +1 more source

