Results 81 to 90 of about 4,501,528 (307)

Quantum key distribution using gaussian-modulated coherent states

open access: yes, 2003
Quantum continuous variables are being explored as an alternative means to implement quantum key distribution, which is usually based on single photon counting.
C-H Bennett   +30 more
core   +2 more sources

Navigating new norms: a systematic review of factors for the development of effective digital tools in higher education

open access: yesFEBS Open Bio, EarlyView.
What factors make for an effective digital learning tool in Higher Education? This systematic review identifies elements of a digital tool that published examples reveal to be features of an engaging and impactful digital tool. A systematic literature search yielded 25 research papers for analysis.
Akmal Arzeman   +4 more
wiley   +1 more source

Privacy-Aware Secure Anonymous Communication Protocol in CPSS Cloud Computing

open access: yesIEEE Access, 2020
Cloud computing has emerged as a promising paradigm for the Internet of Things (IoT) and Cyber-Physical-Social Systems (CPSS). However, the problem of how to ensure the security of data transmission and data storage in CPSS is a key issue to address.
Fengyin Li   +6 more
doaj   +1 more source

Secured Fog-Body-Torrent : A Hybrid Symmetric Cryptography with Multi-layer Feed Forward Networks Tuned Chaotic Maps for Physiological Data Transmission in Fog-BAN Environment

open access: yesInternational Journal of Computational and Experimental Science and Engineering
Recently, the Wireless Body Area Networks (WBAN) have become a promising and practical option in the tele-care medicine information system that aids for the better clinical monitoring and diagnosis.
Parvathy S, Packialatha A
semanticscholar   +1 more source

Sundays in a Quantum Engineer's Life

open access: yes, 2001
I am a Quantum Engineer, but on Sundays I have principles, John Bell opened his "underground colloquium" in March 1983, words which I will never forget! What! John Bell, the great John Bell, presented himself as an engineer!?!
Gisin, N.
core   +2 more sources

Hands‐on protocol for preparing water‐soluble fractions from agri‐food samples for NMR‐based metabolomics analysis

open access: yesFEBS Open Bio, EarlyView.
This research protocol outlines a workflow for nuclear magnetic resonance (NMR)‐based metabolomics in the agri‐food sector. Using two case studies—strawberry leaves (solid matrix) and wine (liquid matrix)—it details the procedures for sample preparation, data acquisition, and processing.
Andrea Fernández‐Veloso   +4 more
wiley   +1 more source

Post-quantum cryptography and the quantum future of cybersecurity.

open access: yesPhysical Review Applied
We review the current status of efforts to develop and deploy post-quantum cryptography on the Internet. Then we suggest specific ways in which quantum technologies might be used to enhance cybersecurity in the near future and beyond.
Yi-Kai Liu, Dustin Moody
semanticscholar   +1 more source

Secure Quantum Key Distribution

open access: yes, 2014
Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography.
Curty, Marcos   +2 more
core   +1 more source

Raman‐based label‐free microscopic analysis of the pancreas in living zebrafish larvae

open access: yesFEBS Open Bio, EarlyView.
Forward stimulated Raman scattering (F‐SRS) and epi coherent anti‐Stokes Raman scattering (E‐CARS) allow label‐free discrimination of distinct subcellular structures in the pancreas of living zebrafish larvae. Given the straightforward applicability, we anticipate broad implementation of Raman microscopy in other organs and across various biomedical ...
Noura Faraj   +3 more
wiley   +1 more source

A novel multi-carrier visual cryptography scheme based on XOR and OR operations

open access: yesJournal of King Saud University: Computer and Information Sciences
The conventional Visual Cryptography Scheme (VCS) relying solely on OR operations suffers from poor recovery quality and severe pixel expansion when implemented on physical transparencies.
Yuan Gao   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy