Results 61 to 70 of about 37,018 (310)
Quick Boot of Trusted Execution Environment With Hardware Accelerators
The Trusted Execution Environment (TEE) offers a software platform for secure applications. The TEE offers a memory isolation scheme and software authentication from a high privilege mode.
Trong-Thuc Hoang +6 more
doaj +1 more source
Antimicrobial peptide (AMP)‐loaded nanocarriers provide a multifunctional strategy to combat drug‐resistant Mycobacterium tuberculosis. By enhancing intracellular delivery, bypassing efflux pumps, and disrupting bacterial membranes, this platform restores phagolysosome fusion and macrophage function.
Christian S. Carnero Canales +11 more
wiley +1 more source
Digital Signature System Using SHA-3 and ECDSA
This research aims to implement an information security system for electronic documents using electronic signatures based on ECDSA (Elliptic Curve Digital Signature Algorithm) and SHA-3 (Secure Hash Algorithm 3) algorithms. This research was conducted to answer questions about the security and integrity protection of digital documents in today's ...
Ade Ismail +2 more
openaire +1 more source
This study presents human in vitro rheumatoid arthritis models using chondrocytes recellularized type II collagen scaffold and 3D‐bioprinted Gelatin‐Matrigel hydrogels with fibroblast‐like synoviocytes, pro‐inflammatory macrophages, and protective barrier macrophages, closely recapitulating key rheumatoid arthritis pathological features.
Huiqun Zhou +6 more
wiley +1 more source
Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability [PDF]
Game-playing proofs constitute a powerful framework for non-quantum cryptographic security arguments, most notably applied in the context of indifferentiability. An essential ingredient in such proofs is lazy sampling of random primitives.
Czajkowski, Jan +3 more
core +1 more source
A colloid‐mediated electroless plating (CMEP) strategy is proposed to fabricate hierarchically porous, amorphous Fe‐doped NiWB electrocatalysts under ambient conditions. The in situ formation of Fe‐W‐O colloidal species guides the formation of robust, porous catalyst layers with excellent mass transfer and durability, sustaining 500 mA cm−2 for 2000 h,
Yu Liao +8 more
wiley +1 more source
Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2
In this paper, we introduce Carry-based Differential Power Analysis (CDPA), a novel methodology that allows for attacking schemes that use arithmetical addition. We apply this methodology to attacking HMAC-SHA-2. We provide full mathematical analysis of
Yaacov Belenky +6 more
doaj +1 more source
Criticality Aware Soft Error Mitigation in the Configuration Memory of SRAM based FPGA
Efficient low complexity error correcting code(ECC) is considered as an effective technique for mitigation of multi-bit upset (MBU) in the configuration memory(CM)of static random access memory (SRAM) based Field Programmable Gate Array (FPGA) devices ...
Chakrabarti, Amlan +4 more
core +1 more source
All‐perovskite tandem solar cells are evaluated under low‐intensity and low‐temperature (LILT) conditions relevant to space environments. Distinct loss regimes emerge, where weaker entropic mixing causes halide segragation below ≈240 K going along with a strong current imbalance, while poor electron transport in C60 dominates.
Sercan Ozen +10 more
wiley +1 more source

