Results 81 to 90 of about 26,053 (287)

PQ-LEACH: A novel post-quantum protocol for securing WSNs communication

open access: yesInternational Journal of Engineering Business Management
Ensuring the confidentiality of communication is of paramount significance. Traditionally, cryptographic practices for Wireless Sensor Networks (WSN) have been primarily based on classical cryptography like RSA and Elliptic Curve, which are potentially ...
Shaykhah S Aldosari, Layla S Aldawsari
doaj   +1 more source

A New Family of Ternary Intermetallic Compounds with Dualistic Atomic Ordering – The ZIP Phases

open access: yesAdvanced Materials, EarlyView.
The ZIP phases are ternary intermetallic compounds with dualistic atomic ordering, i.e., they exhibit one face‐centered cubic (fcc; space group Fd3¯$\bar 3$m) variant and one hexagonal (space group P63/mmc) variant. The ZIP phases in the Nb‐Si‐Ni system are the Nb3SiNi2 (fcc) and Ni3SiNb2 (hexagonal) ternary IMCs, crystal structure schematics of which ...
Matheus A. Tunes   +24 more
wiley   +1 more source

Two Material Properties from One Wavelength‐Orthogonal Photoresin Enabled by a Monochromatic Laser Integrated Stereolithographic Apparatus (Mono LISA)

open access: yesAdvanced Materials, Volume 37, Issue 13, April 2, 2025.
A single object with dual properties – degradable and non‐degradable – is fabricated in a single print simply by switching the printing colors. The advanced multi‐material printing is enabled by the combination of a fully wavelength‐orthogonal photoresin and a monochromatic tunable laser printer, paving the way for precise multi‐material ...
Xingyu Wu   +5 more
wiley   +1 more source

Quantum key distribution through quantum machine learning: a research review

open access: yesFrontiers in Quantum Science and Technology
Quantum cryptography has emerged as a radical research field aimed at mitigating various security threats in modern communication systems. The integration of Quantum Machine Learning (QML) protocols plays a crucial role in enhancing security measures ...
Krupa Purohit, Ajay Kumar Vyas
doaj   +1 more source

Energy Efficiency Analysis of Post-Quantum Cryptographic Algorithms

open access: gold, 2021
Crystal Andrea Roma   +2 more
openalex   +1 more source

Artificial Intelligence‐Assisted Workflow for Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling

open access: yesAdvanced Materials, EarlyView.
AI‐Assisted Workflow for (Scanning) Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling. Abstract (Scanning) transmission electron microscopy ((S)TEM) has significantly advanced materials science but faces challenges in correlating precise atomic structure information with the functional properties of ...
Marc Botifoll   +19 more
wiley   +1 more source

Quantum vs post‐quantum security for future networks: Survey

open access: yesCyber Security and Applications
Classical cryptography (crypt) schemes (sche) have been compromised by the practical results on quantum (q) computers in recent years. Nowadays these sche ‘s can be compromised by using the Shor's methodology. This paper provides a detailed survey of the
Savo Glisic
doaj   +1 more source

Asymptotic security of continuous-variable quantum key distribution with a discrete modulation

open access: yes, 2019
We establish a lower bound on the asymptotic secret key rate of continuous-variable quantum key distribution with a discrete modulation of coherent states.
Diamanti, Eleni   +3 more
core   +3 more sources

Home - About - Disclaimer - Privacy