Results 161 to 170 of about 80,772 (303)
Thermal annealing improves the structure, stiffness, and piezoelectric properties of poly(vinylidene flouride‐trifluoroethylene) (PVDF‐TrFE) nanofiber scaffolds. These annealed scaffolds promote Schwann cell proliferation and matrix remodeling in vitro and demonstrate in vivo biocompatibility.
Maksym Krutko+12 more
wiley +1 more source
RRFL: A rational and reliable federated learning incentive framework for mobile crowdsensing
The data privacy concern for mobile users (MUs) in mobile crowdsensing (MCS) has attracted significant attention. Federated Learning (FL) breaks down data silos, enabling MUs to train locally without revealing actual information.
Qingyi He+3 more
doaj
Public-key cryptography based on bounded quantum reference frames
Lawrence M. Ioannou, Michele Mosca
openalex +2 more sources
Multi‐Level Hybrid Anti‐Counterfeit Labels via Solid‐State Dewetting Under Spatial Confinement
This study presents a hybrid encoding approach combining deterministic patterns fabricated by photolithography and stochastic features formed by the solid‐state dewetting of silver films under strong confinement at the micrometer and nanometer length scales.
Farnaz Foadi+5 more
wiley +1 more source
Research on Development Progress and Test Evaluation of Post-Quantum Cryptography. [PDF]
Zhang M+6 more
europepmc +1 more source
Relations between arithmetic geometry and public key cryptography
Gerhard Frey
openalex +1 more source
Comparative Analysis of RSA and ElGamal Cryptographic Public-key Algorithms [PDF]
Andysah Putera Utama Siahaan+2 more
openalex +1 more source
Optical Chaos Generation and Applications
This review comprehensively examines optical chaos generation via feedback, injection, and optoelectronic methods, emphasizing bandwidth enhancement and time‐delay suppression. Applications include chaos‐synchronized secure communication, physical random number generation, chaotic lidar for cm‐level detection, distributed fiber sensing, and terahertz ...
Wenhui Chen+8 more
wiley +1 more source
An overview of public key cryptography [PDF]
openaire +3 more sources
Conic curve encryption and digital signature based on complex number theory for cybersecurity applications. [PDF]
Kamal A+3 more
europepmc +1 more source