Results 111 to 120 of about 3,071,363 (328)

Methods for Protection of Key in Private Key Cryptography [PDF]

open access: yesInternational Journal of Innovative Research in Computer Science & Technology, 2017
Shubham Garg   +4 more
openaire   +1 more source

Smart Electrochromic Devices for Wearables

open access: yesAdvanced Materials Technologies, EarlyView.
This article reviews the recent progress of smart electrochromic devices in the field of intelligent wearable devices. Serving as displays, dimmers, energy‐saving and energy storage devices, and temperature management components, electrochromic devices have broad prospects in flexible displays, human–computer interaction, and personalized ...
Mengjie Zhu   +6 more
wiley   +1 more source

Privateers in Australia’s conflict and disaster zones [PDF]

open access: yes
The private security industry has become an established component in the conflict and disaster zones where the Australian Government operates and looks set to be an enduring feature of the security landscape.
James Brown
core   +1 more source

Homomorphic Encryption: From Private-Key to Public-Key [PDF]

open access: yes, 2011
We show how to transform any additively homomorphic private-key encryption scheme that is compact, into a public-key encryption scheme. By compact we mean that the length of a homomorphically generated encryption is independent of the number of ciphertexts from which it was created. We do not require anything else on the distribution of homomorphically
openaire   +2 more sources

Aqueous Synthesis of UiO‐66 Metal‐Organic Frameworks With Enhanced Crystallinity and Surface Area

open access: yesAdvanced Sustainable Systems, EarlyView.
In this work, highly crystalline UiO‐66 is synthesized in water at 65 °C, achieving a high surface area of 741 m2 g−1, by modulating the pH of the reaction, promoting optimal coordination between metal clusters and organic linkers. Avoiding toxic and expensive solvents enables future scaling of UiO‐66 production. Abstract Metal‐organic frameworks (MOFs)
Nandish Hosadoddi Srikantamurthy   +4 more
wiley   +1 more source

The LDH‐H3K18La‐Nur77 Axis Potentiates Immune Escape in Small Cell Lung Cancer

open access: yesAdvanced Science, EarlyView.
Lactate from SCLC tumors induces H3K18 lactylation in naïve CD8+ T cells, upregulating Nurr77 and enhancing tonic TCR signaling. This leads to T cell hyporesponsiveness to stimulation, impairing antitumor immunity and reducing immunotherapy efficacy.
Xiaoling Shang   +16 more
wiley   +1 more source

Quantum Key Distribution Based on Private States: Unconditional Security Over Untrusted Channels With Zero Quantum Capacity [PDF]

open access: green, 2008
Karol Horodecki   +4 more
openalex   +1 more source

Common Capital: A Thought Experiment in Cross-Border Resolution [PDF]

open access: yes, 2014
Cross-border bank resolution efforts focus on burden-sharing between bank owners, private creditors and the public. There is little talk of burden-sharing among governments, despite the rich history of governments trying to stick one another with the ...
Gelpern, Anna
core   +1 more source

Home - About - Disclaimer - Privacy