Results 41 to 50 of about 7,184 (199)

Fully Non-interactive Onion Routing with Forward-Secrecy [PDF]

open access: yesInternational Journal of Information Security, 2011
In this paper we put forward a new onion routing protocol which achieves forward secrecy in a fully non-interactive fashion, without requiring any communication from the router and/or the users and the service provider to update time-related keys. We compare this to TOR which requires O(n 2) rounds of interaction to establish a circuit of size n.
CATALANO, Dario   +4 more
openaire   +4 more sources

Laser‐Synthesized Amorphous PdSe2‐x Nanoparticles: A Defect‐Rich Platform for High‐Efficiency SERS, Photocatalysis, and Photothermal Conversion

open access: yesAdvanced Materials Interfaces, EarlyView.
Using femtosecond ablation, we show that an ordered, stoichiometric crystalline PdSe2 target can be controllably converted into a stable, disordered, non‐stoichiometric, and highly functional amorphous nanomaterial, PdSe2−x${\rm PdSe}_{2-x}$. The obtained nanoparticles offer significant advantages over conventional planar plasmon‐free substrates due to
Andrei Ushkov   +18 more
wiley   +1 more source

An anonymity layer for JXTA service [PDF]

open access: yes, 2011
Open Access ...
Arnedo Moreno, Joan   +1 more
core  

Studying Maximum Information Leakage Using Karush-Kuhn-Tucker Conditions [PDF]

open access: yes, 2009
When studying the information leakage in programs or protocols, a natural question arises: "what is the worst case scenario?". This problem of identifying the maximal leakage can be seen as a channel capacity problem in the information theoretical sense.
Chen, Han, Malacaria, Pasquale
core   +3 more sources

Photonics of Topological Magnetic Textures

open access: yesAdvanced Optical Materials, EarlyView.
Localized noncollinear magetic textures imprint their geometry and topology onto traversing photonic fields endowing them with orbital angular‐momentum, chirality, and magnetoelectric densities. Abstract Topological textures in magnetically ordered materials are an important case studies for fundamental research with promising applications in data ...
Vakhtang Jandieri   +6 more
wiley   +1 more source

Review: Insight on Porous Carbon Positive Electrode for Sodium‐Ion Capacitors: Interplay Between Synthesis, Properties, and Performance

open access: yesAdvanced Science, EarlyView.
Sodium ion capacitor (SIC) is currently constrained by the low discharge capacity of commercial activated carbon as positive electrode material. This review provides a holistic summary of research efforts on alternative porous carbon materials for SIC. Image created by the authors with www.biorender.com.
Ademola Adeniji   +2 more
wiley   +1 more source

Mechanistic Insights Into Cellulose Dissolution in Solvents for Advanced Industrial Applications: A Systematic and Bibliometric Review

open access: yesAsia-Pacific Journal of Chemical Engineering, EarlyView.
ABSTRACT Cellulose dissolution is important for various industries, including textiles, bioplastics, foods and pharmaceuticals, yet achieving efficient dissolution remains challenging. Deep eutectic solvents (DES) have emerged as promising alternatives to traditional solvents due to their low toxicity, biodegradability and sustainability.
Chigozie Charity Okwuwa   +4 more
wiley   +1 more source

Multi‐hop anonymous payment channel network based on onion routing

open access: yesIET Blockchain
Payment channel networks (PCNs) are one of the most promising off‐chain solutions to the blockchain scalability problem. However, most current payment channel schemes suffer from overly ideal routing assumptions or fail to provide complete path privacy ...
Caimei Wang, Yudong Ren, Zhize Wu
doaj   +1 more source

Carbon/Silicon Heterojunction Solar Cells: Status and Perspectives

open access: yesCarbon Energy, EarlyView.
This review examines carbon/silicon heterojunctions and highlights the advantages of carbon materials in terms of cost‐effectiveness, low‐temperature processing, and scalability. It adopts a comprehensive approach to bridge the gap between laboratory‐scale innovations and industrial‐scale applications, incorporating current state‐of‐the‐art findings ...
Randi Azmi   +6 more
wiley   +1 more source

TOAR: Toward Resisting AS-Level Adversary Correlation Attacks Optimal Anonymous Routing

open access: yesMathematics
The Onion Router (Tor), as the most widely used anonymous network, is vulnerable to traffic correlation attacks by powerful passive adversaries, such as Autonomous Systems (AS). AS-level adversaries increase their chances of executing correlation attacks
Hui Zhao, Xiangmei Song
doaj   +1 more source

Home - About - Disclaimer - Privacy