Results 81 to 90 of about 3,565 (253)

Dual-band complex-amplitude metasurface empowered high security cryptography with ultra-massive encodable patterns

open access: yesNanophotonics
The significance of a cryptograph method lies in its ability to provide high fidelity, high security, and large capacity. The emergence of metasurface-empowered cryptography offers a promising alternative due to its unparalleled wavefront modulation ...
Gu Zhen   +9 more
doaj   +1 more source

Secure, Image based Private Key for Secret Message Cryptography

open access: yesInternational Journal of Computer Applications, 2021
Amjad Al Hindi   +2 more
openaire   +1 more source

Laparoscopic Colorectal Surgery in the Era of Robotics: Evolution, Eclipse, or Equilibrium?

open access: yesAnnals of Gastroenterological Surgery, EarlyView.
ABSTRACT Minimally invasive colorectal surgery has undergone a remarkable transformation over the past three decades. Laparoscopy, once viewed with skepticism, is now firmly established as a standard approach, supported by robust randomized trials demonstrating oncologic safety and improved recovery compared to open surgery.
Amanjeet Singh   +3 more
wiley   +1 more source

Implementation of Italian industry 4.0 quantum testbed in Turin

open access: yesIET Quantum Communication
The security of data communications is one of the crucial challenges that our society is facing today. Quantum Key Distribution (QKD) is one of the most prominent methods for guaranteeing ultimate security based on the laws of quantum physics.
Nicola Corrias   +17 more
doaj   +1 more source

Large Language Model in Materials Science: Roles, Challenges, and Strategic Outlook

open access: yesAdvanced Intelligent Discovery, EarlyView.
Large language models (LLMs) are reshaping materials science. Acting as Oracle, Surrogate, Quant, and Arbiter, they now extract knowledge, predict properties, gauge risk, and steer decisions within a traceable loop. Overcoming data heterogeneity, hallucinations, and poor interpretability demands domain‐adapted models, cross‐modal data standards, and ...
Jinglan Zhang   +4 more
wiley   +1 more source

Accelerating Primary Screening of USP8 Inhibitors from Drug Repurposing Databases with Tree‐Based Machine Learning

open access: yesAdvanced Intelligent Discovery, EarlyView.
This study introduces a tree‐based machine learning approach to accelerate USP8 inhibitor discovery. The best‐performing model identified 100 high‐confidence repurposable compounds, half already approved or in clinical trials, and uncovered novel scaffolds not previously studied. These findings offer a solid foundation for rapid experimental follow‐up,
Yik Kwong Ng   +4 more
wiley   +1 more source

Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Classic McEliece is one of the three code-based candidates in the fourth round of the NIST post-quantum cryptography standardization process in the Key Encapsulation Mechanism category. As such, its decapsulation algorithm is used to recover the session
Vlad-Florin Drăgoi   +4 more
doaj   +1 more source

Public Key Cryptography for 5G Private Identification

open access: yes, 2020
The next generation of mobile networks is called 5G. 5G introduces several improvements from the previous generation known as Long Term Evolution (LTE). Some of these improvements are related to subscriber privacy. A new protection scheme for the permanent subscriber identifier has been included.
openaire   +1 more source

A Generalized Framework for Data‐Efficient and Extrapolative Materials Discovery for Gas Separation

open access: yesAdvanced Intelligent Discovery, EarlyView.
This study introduces an iterative supervised machine learning framework for metal‐organic framework (MOF) discovery. The approach identifies over 97% of the best performing candidates while using less than 10% of available data. It generalizes across diverse MOF databases and gas separation scenarios.
Varad Daoo, Jayant K. Singh
wiley   +1 more source

THE McELIECE CRYPTOSYSTEM WITH ARRAY CODES

open access: yesSakarya Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 2011
Public-key cryptosystems form an important part of cryptography. In these systems, every user has a public and a private key. The public key allows other users to encrypt messages, which can only be decoded using the secret private key.
Vedat Şiap
doaj   +1 more source

Home - About - Disclaimer - Privacy