Results 81 to 90 of about 2,794 (176)

Ultraflat, Monolithic, Highly Stable Supercontinuum Source Based on Fluorotellurite Fiber

open access: yesAdvanced Photonics Research, Volume 6, Issue 1, January 2025.
An ultraflat, broadband‐coverage, high‐power midinfrared supercontinuum laser source is proposed and thoroughly studied. The nonlinear medium is a fluorotellurite fiber with stable thermal properties, high nonlinear coefficient, and good water resistance.
Hao Lei   +10 more
wiley   +1 more source

Research advances in molecular mechanisms regulating heat tolerance in cool‐season turfgrasses

open access: yesCrop Science, Volume 65, Issue 1, January/February 2025.
Abstract Cool‐season turfgrasses widely used on golf courses, athletic fields, and other landscapes are environmentally and economically important, but they are functionally and aesthetically damaged under prolonged exposure to high temperatures because of their sensitivity to heat stress.
Stephanie Rossi, Bingru Huang
wiley   +1 more source

Towards quantum‐safe blockchain: Exploration of PQC and public‐key recovery on embedded systems

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
This paper addresses the need for quantum‐safe blockchain solutions specifically for embedded systems by integrating Post‐Quantum Cryptography (PQC) into blockchain frameworks. We propose a quantum‐secure blockchain architecture using NIST‐standardized PQC algorithms, finding Falcon‐512 to be optimal for embedded environments due to its security and ...
Dominik Marchsreiter
wiley   +1 more source

RETRACTED ARTICLE: Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment

open access: yesEURASIP Journal on Information Security
In recent years, various smart devices based on IoT technology, such as smart homes, healthcare, detection, and logistics systems, have emerged. However, as the number of IoT-connected devices increases, securing the IoT is becoming increasingly ...
Lin Yang
doaj   +1 more source

CIDER: Cyber‐Security in Industrial IoT Using Deep Learning and Ring Learning with Errors

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 10, Issue 1, January/December 2025.
This paper proposes secure measures using deep machine learning‐based intrusion detection and advanced encryption schemes based on lattice‐based cryptography on the cloud‐edge‐fog IIoT architecture. The evaluation experiments performed on the Ton_IoT dataset show that the deep learning models have a very good accuracy of around 92% for attack ...
Siu Ting Tsoi, Anish Jindal
wiley   +1 more source

Algebraic aspects of solving Ring-LWE, including ring-based improvements in the Blum-Kalai-Wasserman algorithm [PDF]

open access: yes, 2020
We provide a reduction of the Ring-LWE problem to Ring-LWE problems in subrings, in the presence of samples of a restricted form (i.e. $(a,b)$ such that $a$ is restricted to a multiplicative coset of the subring).
Stange, Katherine E.
core   +1 more source

LWE from non-commutative group rings [PDF]

open access: green, 2021
Qi Cheng, Jun Zhang, Jincheng Zhuang
openalex   +1 more source

The Potential for Machine Learning Analysis over Encrypted Data in Cloud-based Clinical Decision Support - Background and Review [PDF]

open access: yes, 2015
This paper appeared at the 8th Australasian Workshop on Health Informatics and Knowledge Management (HIKM 2015), Sydney, Australia, January 2015. Conferences in Research and Practice in Information Technology (CRPIT), Vol.
Basilakis, J, Javadi, B, Maeder, Anthony
core  

Algorithms on Ideal over Complex Multiplication order [PDF]

open access: yes, 2016
We show in this paper that the Gentry-Szydlo algorithm for cyclotomic orders, previously revisited by Lenstra-Silverberg, can be extended to complex-multiplication (CM) orders, and even to a more general structure.
Kirchner, Paul
core   +1 more source

Home - About - Disclaimer - Privacy