Results 151 to 160 of about 7,184,030 (395)

Financial Security

open access: yesFinance and Society, 2015
This essay was originally published in The Routledge Handbook of New Security Studies (Burgess, 2010), and has since become a key reference point in debates on the finance-security nexus. It is reproduced here as a starting point for the present forum, which aims to further advance efforts ...
openaire   +5 more sources

NanoMOF‐Based Multilevel Anti‐Counterfeiting by a Combination of Visible and Invisible Photoluminescence and Conductivity

open access: yesAdvanced Functional Materials, EarlyView.
This study presents novel anti‐counterfeiting tags with multilevel security features that utilize additional disguise features. They combine luminescent nanosized Ln‐MOFs with conductive polymers to multifunctional mixed‐matrix membranes and powder composites. The materials exhibit visible/NIR emission and matrix‐based conductivity even as black bodies.
Moritz Maxeiner   +9 more
wiley   +1 more source

Integration of Perovskite/Low‐Dimensional Material Heterostructures for Optoelectronics and Artificial Visual Systems

open access: yesAdvanced Functional Materials, EarlyView.
Heterojunctions combining halide perovskites with low‐dimensional materials enhance optoelectronic devices by enabling precise charge control and improving efficiency, stability, and speed. These synergies advance flexible electronics, wearable sensors, and neuromorphic computing, mimicking biological vision for real‐time image analysis and intelligent
Yu‐Jin Du   +11 more
wiley   +1 more source

Metastatic colon involvement from primary adrenal gland angiosarcoma: a case report

open access: yesJournal of Medical Case Reports
Introduction Angiosarcoma is a rare and aggressive malignancy accounting for 1–2% of soft tissue sarcomas. Primary adrenal angiosarcomas are exceptionally rare, with fewer than 60 cases reported.To our knowledge, this is the first documented case of an ...
Sarra Ben Rejeb   +4 more
doaj   +1 more source

On the security of public key protocols

open access: yes22nd Annual Symposium on Foundations of Computer Science (sfcs 1981), 1981
D. Dolev, A. Yao
semanticscholar   +1 more source

Towards Enhanced Usability of IT Security Mechanisms - How to Design Usable IT Security Mechanisms Using the Example of Email Encryption

open access: yes, 2015
Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most of these mechanisms are effective, and security experts can handle them to achieve a sufficient level of security for any given system.
Hof, Hans-Joachim
core   +1 more source

Experimental and Theoretical Confirmation of Covalent Bonding in α‐Pu

open access: yesAdvanced Functional Materials, EarlyView.
From a combination of Reverse Monte Carlo dynamic rigid body fitting to the pair distribution functional and novel density functional approaches, the existence of covalent bonding is confirmed in α‐plutonium alongside other bonding types (i.e. mixed bonding schemes).
Alexander R. Muñoz   +10 more
wiley   +1 more source

Home - About - Disclaimer - Privacy