Results 41 to 50 of about 27,441 (278)

Enhanced Rheological and Filtration Performance of Drilling Fluids Using Fe3O4/Saponin/Cu(II) Nanocomposites: Synthesis, Characterization, and Application

open access: yesAsia-Pacific Journal of Chemical Engineering, EarlyView.
ABSTRACT Drilling fluids used in high‐performance well operations often struggle to maintain rheological stability, colloidal dispersion, and filtration control under harsh downhole conditions. This study engineered a multifunctional Fe3O4@Saponin/Cu(II) nanocomposite to address these challenges.
Kassem Al Attabi   +9 more
wiley   +1 more source

MRCC: A Practical Covert Channel Over Monero With Provable Security

open access: yesIEEE Access, 2021
Covert channels are designed to protect the communication relationship of the sender and receiver. Traditional covert channels have become insecure due to the continuous improvement of traffic analysis techniques. In this context, there is an urgent need
Zhaozhong Guo   +3 more
doaj   +1 more source

NP-completeness of Certain Sub-classes of the Syndrome Decoding Problem [PDF]

open access: yes, 2009
The problem of Syndrome Decoding was proven to be NP-complete in 1978 and, since then, quite a few cryptographic applications have had their security rely on the (provable) difficulty of solving some instances of it. However, in most cases, the instances
Finiasz, Matthieu
core  

Operationalizing BioSSbD: A safe‐and‐sustainable‐by‐design framework for biorefineries

open access: yesBiofuels, Bioproducts and Biorefining, EarlyView.
Abstract Biorefineries are central to the transition toward a circular bioeconomy; however, their increasing scale and technological heterogeneity, and the integration of biological, chemical, and thermochemical processes introduce complex challenges related to safety, sustainability, and operational reliability. Existing Safe‐and‐Sustainable‐by‐Design
Fernando Ramonet
wiley   +1 more source

Digital diagnostics, biomarkers and therapeutics in an evolving healthcare system: From promise to practice

open access: yesBritish Journal of Clinical Pharmacology, EarlyView.
Abstract Health care is shifting towards a digital‐guided system, integrating digital diagnostics, biomarkers and therapeutics in many care pathways. However, despite rapid technological advancement and preliminary adoption accelerated by the COVID‐19 pandemic, a significant implementation gap persists. This narrative review explores the causes of this
Mees H. P. Stoop   +3 more
wiley   +1 more source

Provable Secure Generalized Signcryption [PDF]

open access: yesJournal of Computers, 2010
Generalized signcryption which proposed by Han is a new cryptographic primitive which can work as an en- cryption scheme, a signature scheme or a signcryption scheme[5]. However,the security proof in their paper is uncorrect. our contribution are as following:First we give security notions for this new primitive.Secnond,we give an attack to [4] which ...
Xu an Wang, Xiaoyuan Yang, Jindan Zhang
openaire   +1 more source

Understanding international students' agency in developing employability: Case study of a post‐1992 university in the United Kingdom

open access: yesBritish Educational Research Journal, EarlyView.
Abstract Employability remains a critical issue for international students in the United Kingdom. This study adopts the Employability Agency Framework proposed by Pham et al. to explore how a group of international students actively exercised their agency to enhance their employability during their Master's studies in the United Kingdom.
Hoang Nguyen, Ming Cheng
wiley   +1 more source

EPN:encryption padding for NTRU with provable security

open access: yesTongxin xuebao, 2008
Known as the fastest public key cryptosystem available now,the provable security of NTRU has not been solved well.an encryption padding,called EPN was designed,for NTRU.Under the full domain one wayness assumption of NTRU,EPN had been proved ...
MU Ning-bo, HU Yu-pu, WANG Bao-cang
doaj   +2 more sources

Stronger Security Variants of GCM-SIV

open access: yesIACR Transactions on Symmetric Cryptology, 2016
At CCS 2015, Gueron and Lindell proposed GCM-SIV, a provably secure authenticated encryption scheme that remains secure even if the nonce is repeated.
Tetsu Iwata, Kazuhiko Minematsu
doaj   +1 more source

Security of COFB against Chosen Ciphertext Attacks

open access: yesIACR Transactions on Symmetric Cryptology, 2022
COFB is a lightweight Authenticated Encryption with Associated Data (AEAD) mode based on block ciphers. It was proposed in CHES 2017 and is the basis for GIFT-COFB, a finalist in the NIST lightweight standardization project.
Mustafa Khairallah
doaj   +1 more source

Home - About - Disclaimer - Privacy