Results 241 to 250 of about 448,852 (275)
Some of the next articles are maybe not open access.
Joint Physical–Application Layer Security
2016Due to the explosive growth of mobile data traffic, wireless multimedia content delivery turns to be an important application in D2D communications. In this chapter, we focus on the security for wireless multimedia transmission over D2D communications.
Aiqing Zhang, Liang Zhou, Lei Wang
openaire +1 more source
Climate change impacts on plant pathogens, food security and paths forward
Nature Reviews Microbiology, 2023Brajesh K Singh +2 more
exaly
The rumen microbiome: balancing food security and environmental impacts
Nature Reviews Microbiology, 2021Itzhak Mizrahi, Robert Wallace
exaly
Physical layer security: biometrics vs. physical objects
2017This chapter compares and describes the biometrics and physical object security fields, based on physical unclonable functions. Both lay at the foundation of authentication and identification architectures based on the assumption that the used primitives are both nonclonable and unique.
openaire +1 more source
Physical Layer Security using SMO
2022 International Conference on Computing, Communication and Power Technology (IC3P), 2022P. Chandra Sekhar, T. S. N. Murthy
openaire +1 more source
Nano-enabled pesticides for sustainable agriculture and global food security
Nature Nanotechnology, 2022Deng-jun Wang, Navid B Saleh, Kay T Ho
exaly
Circularly polarized lanthanide luminescence for advanced security inks
Nature Reviews Chemistry, 2020Lewis Edward MacKenzie, Robert Pal
exaly
A Survey on Security Aspects for 3GPP 5G Networks
IEEE Communications Surveys and Tutorials, 2020Jin Cao, Maod, Hui Li
exaly

