Results 121 to 130 of about 399,159 (347)
Shellac, a centuries‐old natural resin, is reimagined as a green material for flexible electronics. When combined with silver nanowires, shellac films deliver transparency, conductivity, and stability against humidity. These results position shellac as a sustainable alternative to synthetic polymers for transparent conductors in next‐generation ...
Rahaf Nafez Hussein +4 more
wiley +1 more source
Mitigating Timing Side-Channel Attacks in Software-Defined Networks: Detection and Response [PDF]
Faizan Shoaib +3 more
openalex +1 more source
On the use of error detecting and correcting codes to boost security in caches against side channel attacks [PDF]
Microprocessor memory is sensitive to cold boot attacks. In this kind of attacks, memory remanence is exploited to download its content after the microprocessor has been struck by a hard boot.
Manich Bou, Salvador +2 more
core
Glyphosate (GLY) and its primary metabolite, aminomethylphosphonic acid (AMPA), are photodegraded using a poly(vinylidene fluoride) membrane with immobilized titanium dioxide (PVDF‐TiO2) in a continuous flow‐through operation under solar light. At optimized conditions, the PVDF‐TiO2 membrane achieved 95% GLY and 80% AMPA removal with •O2− as the ...
Phuong B. Trinh +4 more
wiley +1 more source
Backbone Heterojunction Photocatalysts for Efficient Sacrificial Hydrogen Production
Herein, a ‘single‐component’ organic semiconductor photocatalyst is presented in which a molecular donor is bonded to a polymer acceptor. The resultant material demonstrates exceptional photocatalytic activity for hydrogen evolution in aqueous triethylamine with an outstanding external quantum efficiency of 38% at 420 nm.
Richard J. Lyons +11 more
wiley +1 more source
Side-Channel Attacks Meet Secure Network Protocols [PDF]
Side-channel attacks are powerful tools for breaking systems that implement cryptographic algorithms. The Advanced Encryption Standard (AES) is widely used to secure data, including the communication within various network protocols. Major cryptographic libraries such as OpenSSL or ARM mbed TLS include at least one implementation of the AES.
Biryukov, Alex +2 more
openaire +2 more sources
Reevaluating the Activity of ZIF‐8 Based FeNCs for Electrochemical Ammonia Production
Though receiving much attention, the field of electrochemical nitrogen reduction reaction (eNRR) to ammonia is marked by doubts about whether this reaction is possible in aqueous media. This work sheds light on this question for iron single‐atom on N‐doped carbon (FeNC) catalysts—a class of well‐known catalysts that is also worth testing for the sister
Caroline Schneider +6 more
wiley +1 more source
A Real-Time Cache Side-Channel Attack Detection System on RISC-V Out-of-Order Processor [PDF]
Anh-Tien Le +5 more
openalex +1 more source
Practical Algebraic Side-Channel Attacks Against ACORN [PDF]
The authenticated cipher ACORN is one of the two finalists of the CAESAR competition and is intended for lightweight applications. Because such use cases require protection against physical attacks, several works have been undertaken to achieve secure implementations. Although dedicated threshold and masked schemes have been proposed, no practical side-
Adomnicai, Alexandre +2 more
openaire +3 more sources
Implementation of Drug‐Induced Rhabdomyolysis and Acute Kidney Injury in Microphysiological System
A modular Muscle–Kidney proximal tubule‐on‐a‐chip integrates 3D skeletal muscle and renal proximal tubule tissues to model drug‐induced rhabdomyolysis and acute kidney injury. The coculture system enables dynamic tissue interaction, functional contraction monitoring, and quantification of nephrotoxicity, revealing drug side effect‐induced metabolic ...
Jaesang Kim +4 more
wiley +1 more source

