A critical analysis of deployed use cases for quantum key distribution and comparison with post-quantum cryptography. [PDF]
Aquina N +9 more
europepmc +1 more source
Why do some women choose to submit to their husbands in marriage? In anthropology, the paradox of ‘chosen submission’ has famously been explored by Saba Mahmood. Her work amongst Egyptian women donning the veil in the Islamic da'wa movement spotlights the notion of ‘piety’ to explore how devotion to God can act as a powerful motivator of human ...
Naomi Richman
wiley +1 more source
Compound Meta-Optics for Advanced Optical Engineering. [PDF]
Lee HR, Kim D, Kim SJ.
europepmc +1 more source
Germ Panic and Chalice Hygiene in the Church of England, c.1895–1930
The late‐Victorian medical revolution in bacteriology, and growing public awareness of hygienic standards and the danger of disease infection from germs, created alarm about the traditional Christian practice of drinking from a common cup at Holy Communion.
Andrew Atherstone
wiley +1 more source
A multi-image codebook approach for secure text transmission. [PDF]
Rashid OF, Tuama SA, Al-Shahwani H.
europepmc +1 more source
Enhanced optical encryption via polarization-dependent multi-channel metasurfaces. [PDF]
Ning M +7 more
europepmc +1 more source
A custom hash algorithm for hosting secure gray scale image repository in public cloud. [PDF]
Murugesan V +2 more
europepmc +1 more source
Claus Offe (1940–2025): A Tribute to His Academic Work and His Role as a Political Intellectual
Constellations, EarlyView.
Tine Stein
wiley +1 more source
A hybrid steganography framework using DCT and GAN for secure data communication in the big data era. [PDF]
Malik KR +7 more
europepmc +1 more source
Triple-layered security system: reliable and secured image communications over 5G and beyond networks. [PDF]
Srour T +3 more
europepmc +1 more source

