Results 71 to 80 of about 60,860 (288)
Insecurity of Quantum Secure Computations
It had been widely claimed that quantum mechanics can protect private information during public decision in for example the so-called two-party secure computation.
A. C.-C. Yao +25 more
core +3 more sources
Inspired by cat vibrissae, biomimetic biomass PHFs/SA aerogels (BFAs) are developed via precursor‐assisted in situ polymerization and freeze‐synergistic assembly. These ultralight, porous pressure sensors exhibit high sensitivity and excellent durability, enabling pulse detection, handwriting recognition, Morse code transmission, and notably real‐time ...
Dandan Xie +6 more
wiley +1 more source
Cryptography: Mathematical Advancements on Cyber Security [PDF]
The origin of cryptography, the study of encoding and decoding messages, dates back to ancient times around 1900 BC. The ancient Egyptians enlisted the use of basic encryption techniques to conceal personal information.
Bower, Kristin
core +1 more source
Engineering Aging: Approaches to Model and Deconstruct Biological Complexity
The macro‐experiences of aging are the result of an accumulation of micro‐changes that occur over time. Abstract The disparity between the global increase in life expectancy and the steady decline in health outcomes with age has been a major driver for developing new ways to research aging.
Habib Joukhdar +7 more
wiley +1 more source
Model for cryptography protection of confidential information [PDF]
УДК 004.056 Борсуковський Ю.В., Борсуковська В.Ю. Модель криптографічного захисту конфіденційної інформації В даній статті проведено детальний аналіз вимог щодо формування моделі криптографічного захисту конфіденційної інформації.
Борсуковська, Вікторія Юріївна +1 more
core
Integrating identity-based cryptography in IMS service authentication
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very
Abid, Mohamed +3 more
core +6 more sources
Smart Electrochromic Devices for Wearables
This article reviews the recent progress of smart electrochromic devices in the field of intelligent wearable devices. Serving as displays, dimmers, energy‐saving and energy storage devices, and temperature management components, electrochromic devices have broad prospects in flexible displays, human–computer interaction, and personalized ...
Mengjie Zhu +6 more
wiley +1 more source
Securing the Data in Clouds with Hyperelliptic Curve Cryptography
In todays world, Cloud computing has attracted research communities as it provides services in reduced cost due to virtualizing all the necessary resources. Even modern business architecture depends upon Cloud computing .As it is a internet based utility,
Agrawal, Tanmay +3 more
core +1 more source
A Modular and Customizable CRISPR/Cas Toolkit for Epigenome Editing of Cis‐regulatory Modules
Epigenome editing surpasses genome editing in gene regulation. Modular epigenome editing frameworks are developed to interrogate cis‐regulome, enabling tunable reprogramming of cis‐elements, uncovering their epigenetic responsiveness and cross‐species portability.
Lingrui Zhang +6 more
wiley +1 more source
Key derivation function: key-hash based computational extractor and stream based pseudorandom expander [PDF]
The key derivation function is a specific cryptographic algorithm that transforms private string and public strings into one or more cryptographic keys.
Chai Wen Chuah +2 more
doaj +2 more sources

