Results 31 to 40 of about 2,320 (256)

Photonics based perfect secrecy cryptography: Toward fully classical implementations [PDF]

open access: yesApplied Physics Letters, 2020
Developing an unbreakable cryptography is a long-standing question and a global challenge in the internet era. Photonics technologies are at the frontline of research, aiming at providing the ultimate system with capability to end the cybercrime industry by changing the way information is treated and protected now and in the long run.
Valerio Mazzone   +3 more
openaire   +3 more sources

Two Material Properties from One Wavelength‐Orthogonal Photoresin Enabled by a Monochromatic Laser Integrated Stereolithographic Apparatus (Mono LISA)

open access: yesAdvanced Materials, Volume 37, Issue 13, April 2, 2025.
A single object with dual properties – degradable and non‐degradable – is fabricated in a single print simply by switching the printing colors. The advanced multi‐material printing is enabled by the combination of a fully wavelength‐orthogonal photoresin and a monochromatic tunable laser printer, paving the way for precise multi‐material ...
Xingyu Wu   +5 more
wiley   +1 more source

An Atomic‐Level Bimetallic MOF Platform Overcoming the Stability‐Performance Tradeoff for Laser Propulsion

open access: yesAdvanced Materials, EarlyView.
This work introduces an atomic‐level engineered bimetallic MOF Platform that resolves the inherent trade‐off between environmental stability and propulsion efficiency. By integrating robust Fe‐O bonds for hydrolysis resistance and enabling d‐orbital charge transfer (Fe3+→Cu2+) for enhanced photothermal conversion, the design achieves a highly durable ...
Senlin Rao   +3 more
wiley   +1 more source

Fabric‐Based Wearable Robotic Exoskeleton Gloves: Advancements and Challenges

open access: yesAdvanced Materials Technologies, EarlyView.
This review highlights interdisciplinary technological advances in fabric‐based robotic gloves, focusing on progress in design, fabrication, actuation, sensing, control, and power and energy requirements. It also addresses performance testing and validation, including biomechanical, strength, functional, user experience, and durability assessments, to ...
Ayse Feyza Yilmaz   +2 more
wiley   +1 more source

A Real Orthogonal Space-Time Coded UWB Scheme for Wireless Secure Communications

open access: yesEURASIP Journal on Wireless Communications and Networking, 2009
Recent research reveals that information security and information-hiding capabilities can be enhanced by proper exploitation of space-time techniques. Meanwhile, intrinsic properties of ultra-wideband (UWB) signals make it an outstanding candidate for ...
Yanbing Zhang, Huaiyu Dai
doaj   +2 more sources

Distributed Matching Algorithms: Maximizing Secrecy in the Presence of Untrusted Relay [PDF]

open access: yesRadioengineering, 2017
In this paper, we propose a secrecy sum-rate maximization based matching algorithm between primary transmitters and secondary cooperative jammers in the presence of an eavesdropper.
B. Ali   +3 more
doaj  

Soft Robotic Excretory Care Simulator for Nursing Education: Functional and Perceptual Biomimetics Approach

open access: yesAdvanced Robotics Research, EarlyView.
A soft robotic simulator is developed to replicate the digital removal of feces (DRF), a sensitive yet essential nursing procedure. Integrating soft actuators, sensors, and a realistic rectal model, the simulator balances functional fidelity with perceptual realism. Engineering evaluations and nurse feedback confirm its potential to enhance training in
Shoko Miyagawa   +10 more
wiley   +1 more source

Perfect secrecy cryptosystem with nonuniform distribution of keys

open access: yesTongxin xuebao, 2018
More strictly mathematical concepts of infinite perfect secrecy and random “one-time pad” cryptosystem in theory were presented,and the whole secure communication system was divided into two stages:design of a basic cryptosystem and one of its ...
Chuanjun TIAN
doaj   +2 more sources

Secrecy Balancing over Two-User MISO Interference Channels with Rician Fading

open access: yesInternational Journal of Antennas and Propagation, 2013
This paper considers a 2-user multiple-input single-output (MISO) interference channel with confidential messages (IFC-CM), in which the Rician channel model is assumed.
Jiqing Ni   +5 more
doaj   +1 more source

Perfect Secrecy Using Compressed Sensing

open access: yes, 2010
In this paper we consider the compressed sensing-based encryption and proposed the conditions in which the perfect secrecy is obtained. We prove when the Restricted Isometery Property (RIP) is hold and the number of measurements is more than two times of sparsity level i.e. M \geq 2k, the perfect secrecy condition introduced by Shannon is achievable if
Mayiami, Mahmoud Ramezani   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy