Results 91 to 100 of about 3,071,363 (328)
Normalized Unconditional ϵ-Security of Private-Key Encryption
In this paper we introduce two normalized versions of non-perfect security for private-key encryption: one version in the framework of Shannon entropy, another version in the framework of Kolmogorov complexity.
Lvqing Bi, Songsong Dai, Bo Hu
doaj +1 more source
Research on Wallet Protection Against Currency Failure in Blockchain
The protection of blockchain wallet is the basis of secure transaction in blockchain. Private key is the core of wallet security. The private key cannot be protected based on a reliable third party.
ZHOU Jian, SUN Liyan, FU Ming
doaj +1 more source
Biopolymers are sustainable, biodegradable alternatives to petroleum‐based plastics for food packaging. Its adoption is often limited by poor mechanical strength, barrier properties, and improved thermal stability through the incorporation of nanofillers.
Himakshi Baishya+2 more
wiley +1 more source
We propose a new computationally efficient privacy-preserving identification framework based on layered sparse coding. The key idea of the proposed framework is a sparsifying transform learning with ambiguization, which consists of a trained linear map ...
Ferdowsi, Sohrab+3 more
core +1 more source
High‐density BNNT films, enabling mechanical robustness and high space radiation shielding effectiveness, are fabricated using surfactant‐stabilized BNNT liquid crystal. Simulations indicate that a 50 g cm−2 BNNT film can reduce radiation exposure by 56% compared to zero shielding, potentially doubling the duration of astronaut missions on the lunar ...
Young‐Kyeong Kim+17 more
wiley +1 more source
Community Revitalization in the United States and the United Kingdom [PDF]
Summarizes a comparison of American and British approaches to community revitalization, cohesion, and sustainability based on visits and policy seminars.
core
Flexible quantum private queries based on quantum key distribution
We present a flexible quantum-key-distribution-based protocol for quantum private queries. Similar to M. Jakobi et al's protocol [Phys. Rev. A 83, 022301 (2011)], it is loss tolerant, practical and robust against quantum memory attack.
Bennett+15 more
core +1 more source
Inspired by cat vibrissae, biomimetic biomass PHFs/SA aerogels (BFAs) are developed via precursor‐assisted in situ polymerization and freeze‐synergistic assembly. These ultralight, porous pressure sensors exhibit high sensitivity and excellent durability, enabling pulse detection, handwriting recognition, Morse code transmission, and notably real‐time ...
Dandan Xie+6 more
wiley +1 more source
ESTABLISHED WAYS TO ATTACK EVEN THE BEST ENCRYPTION ALGORITHM [PDF]
Which solution is the best – public key or private key encryption? This question cannot have a very rigorous, logical and definitive answer, so that the matter be forever settled :).
Alexandru Tabusca
core
Self‐Spiking Linear Neuromorphic Soft Pressure Sensor for Underwater Sensing Applications
This study presents a novel design of a neuromorphic pressure sensor that can generate self‐spiking symmetric signals with direct event‐based encoding through the integration of magnetic spheres and alternating coil circuits. The key advantages of this work include high linearity up to 200 kPa (R2 = 0.997), self‐spiking behavior for simplified signal ...
Jingyi Yang+17 more
wiley +1 more source