Results 81 to 90 of about 4,501,528 (307)
Quantum key distribution using gaussian-modulated coherent states
Quantum continuous variables are being explored as an alternative means to implement quantum key distribution, which is usually based on single photon counting.
C-H Bennett +30 more
core +2 more sources
What factors make for an effective digital learning tool in Higher Education? This systematic review identifies elements of a digital tool that published examples reveal to be features of an engaging and impactful digital tool. A systematic literature search yielded 25 research papers for analysis.
Akmal Arzeman +4 more
wiley +1 more source
Privacy-Aware Secure Anonymous Communication Protocol in CPSS Cloud Computing
Cloud computing has emerged as a promising paradigm for the Internet of Things (IoT) and Cyber-Physical-Social Systems (CPSS). However, the problem of how to ensure the security of data transmission and data storage in CPSS is a key issue to address.
Fengyin Li +6 more
doaj +1 more source
Recently, the Wireless Body Area Networks (WBAN) have become a promising and practical option in the tele-care medicine information system that aids for the better clinical monitoring and diagnosis.
Parvathy S, Packialatha A
semanticscholar +1 more source
Sundays in a Quantum Engineer's Life
I am a Quantum Engineer, but on Sundays I have principles, John Bell opened his "underground colloquium" in March 1983, words which I will never forget! What! John Bell, the great John Bell, presented himself as an engineer!?!
Gisin, N.
core +2 more sources
This research protocol outlines a workflow for nuclear magnetic resonance (NMR)‐based metabolomics in the agri‐food sector. Using two case studies—strawberry leaves (solid matrix) and wine (liquid matrix)—it details the procedures for sample preparation, data acquisition, and processing.
Andrea Fernández‐Veloso +4 more
wiley +1 more source
Post-quantum cryptography and the quantum future of cybersecurity.
We review the current status of efforts to develop and deploy post-quantum cryptography on the Internet. Then we suggest specific ways in which quantum technologies might be used to enhance cybersecurity in the near future and beyond.
Yi-Kai Liu, Dustin Moody
semanticscholar +1 more source
Secure Quantum Key Distribution
Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography.
Curty, Marcos +2 more
core +1 more source
Raman‐based label‐free microscopic analysis of the pancreas in living zebrafish larvae
Forward stimulated Raman scattering (F‐SRS) and epi coherent anti‐Stokes Raman scattering (E‐CARS) allow label‐free discrimination of distinct subcellular structures in the pancreas of living zebrafish larvae. Given the straightforward applicability, we anticipate broad implementation of Raman microscopy in other organs and across various biomedical ...
Noura Faraj +3 more
wiley +1 more source
A novel multi-carrier visual cryptography scheme based on XOR and OR operations
The conventional Visual Cryptography Scheme (VCS) relying solely on OR operations suffers from poor recovery quality and severe pixel expansion when implemented on physical transparencies.
Yuan Gao +4 more
doaj +1 more source

