Results 71 to 80 of about 61,999 (289)
Integrating identity-based cryptography in IMS service authentication
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very
Abid, Mohamed +3 more
core +6 more sources
High‐density BNNT films, enabling mechanical robustness and high space radiation shielding effectiveness, are fabricated using surfactant‐stabilized BNNT liquid crystal. Simulations indicate that a 50 g cm−2 BNNT film can reduce radiation exposure by 56% compared to zero shielding, potentially doubling the duration of astronaut missions on the lunar ...
Young‐Kyeong Kim +17 more
wiley +1 more source
Inspired by cat vibrissae, biomimetic biomass PHFs/SA aerogels (BFAs) are developed via precursor‐assisted in situ polymerization and freeze‐synergistic assembly. These ultralight, porous pressure sensors exhibit high sensitivity and excellent durability, enabling pulse detection, handwriting recognition, Morse code transmission, and notably real‐time ...
Dandan Xie +6 more
wiley +1 more source
Cryptography: Mathematical Advancements on Cyber Security [PDF]
The origin of cryptography, the study of encoding and decoding messages, dates back to ancient times around 1900 BC. The ancient Egyptians enlisted the use of basic encryption techniques to conceal personal information.
Bower, Kristin
core +1 more source
Engineering Aging: Approaches to Model and Deconstruct Biological Complexity
The macro‐experiences of aging are the result of an accumulation of micro‐changes that occur over time. Abstract The disparity between the global increase in life expectancy and the steady decline in health outcomes with age has been a major driver for developing new ways to research aging.
Habib Joukhdar +7 more
wiley +1 more source
Securing the Data in Clouds with Hyperelliptic Curve Cryptography
In todays world, Cloud computing has attracted research communities as it provides services in reduced cost due to virtualizing all the necessary resources. Even modern business architecture depends upon Cloud computing .As it is a internet based utility,
Agrawal, Tanmay +3 more
core +1 more source
This study presents the first pan‐transposable element (TE) atlas in rapeseed, profiling over 8 million TEs across 2311 accessions. Integrative analyses reveal that TEs broadly shape gene expression through diverse regulatory mechanisms, with key insertions in BnaA03.FLC and BnaA09.CYP78A9 linked to flowering time and silique development.
Zhiquan Yang +9 more
wiley +1 more source
Model for cryptography protection of confidential information [PDF]
УДК 004.056 Борсуковський Ю.В., Борсуковська В.Ю. Модель криптографічного захисту конфіденційної інформації В даній статті проведено детальний аналіз вимог щодо формування моделі криптографічного захисту конфіденційної інформації.
Борсуковська, Вікторія Юріївна +1 more
core
Insecurity of Quantum Secure Computations
It had been widely claimed that quantum mechanics can protect private information during public decision in for example the so-called two-party secure computation.
A. C.-C. Yao +25 more
core +3 more sources
SpaBalance: Balanced Learning for Efficient Spatial Multi‐Omics Decoding
SpaBalance is a computational framework that harmonizes multi‐omics learning via gradient equilibrium and dual‐stream feature decomposition, achieving superior clustering accuracy, biological interpretability, and scalable integration of three or more spatial omics modalities.
Yingbo Cui +8 more
wiley +1 more source

