Results 171 to 180 of about 85,961 (310)
Forensics System for Internet of Vehicles Based on Post-Quantum Blockchain. [PDF]
Zhang Z, Cao Z, Wang Y.
europepmc +1 more source
Tumor‐tropic human mesenchymal stem cells (hMSCs) were used as delivery vehicles for magnetotheranostic gold–iron oxide nanoflowers. Magnetic particle imaging of the iron component demonstrated widespread intratumoral distribution and sustained retention in contrast to injection of naked nanoflowers.
Behnaz Ghaemi +7 more
wiley +1 more source
IoT Authentication in Federated Learning: Methods, Challenges, and Future Directions. [PDF]
Badhib A, Alshehri S, Cherif A.
europepmc +1 more source
An IND-CCA2 Secure Public Key Cryptographic Protocol using Suzuki 2-Group
Akshaykumar Meshram +4 more
openalex +1 more source
The facet‐engineered ZnO/Zn3In2S6 heterostructure, dominated by {001} plane coupling, exposes abundant unsaturated Zn sites with elongated Zn─O bonds, directing photoexcited charge carriers along an S‐scheme pathway and suppressing recombination. Enhanced interfacial Zn adsorption toward bisphenol A and methylene blue further synergistically promotes ...
Yang Yang +6 more
wiley +1 more source
Research on the application of quantum-secure algorithms in 5G network
With the widespread application of 5G networks, data transmission speed and capacity have been significantly improved, promoting innovative development in fields such as the Internet of things, autonomous driving, and telemedicine.
WANG Congli +5 more
doaj
Quantum-safe hybrid key exchanges with KEM-based authentication. [PDF]
Battarbee C +4 more
europepmc +1 more source
Ru single atoms and RuP nanoclusters are co‐anchored in N, P, and B co‐doped porous carbon nanospheres via in situ carbonization/phosphidation of a boronate polymer precursor. RuP activates water, while nearby Ru single atoms accelerate H2 formation through H* transfer. The catalyst delivers low overpotential and high durability in alkaline HER and AEM
Xiaohong Wang +13 more
wiley +1 more source
A Quantum Proxy Signature Scheme Without Restrictions on the Identity and Number of Verifiers. [PDF]
Xiong S.
europepmc +1 more source
When RSA Fails: Exploiting Prime Selection Vulnerabilities in Public Key Cryptography [PDF]
Murtaza Nikzad, Kerem Ataş
openalex

