Results 151 to 160 of about 399,159 (347)
The fundamental intricate couplings between electrolyte wetting and fracture evolution are investigated in large single‐crystal V2O5 samples using both experimental techniques and simulations. Both approaches reveal consistent fracture patterns and lithium distribution concentration maps influenced by the wetting mechanism.
Wan‐Xin Chen +6 more
wiley +1 more source
Shared FPGAs and the Holy Grail: Protections against Side-Channel and Fault Attacks
Ognjen Glamočanin +3 more
openalex +2 more sources
In this survey, we first briefly review the current state of cyber attacks, highlighting significant recent changes in how and why such attacks are performed. We then investigate the mechanics of malware command and control (C2) establishment: we provide
Cova, Marco +2 more
core
Last-Level Cache Side-Channel Attacks are Practical
Fangfei Liu +4 more
semanticscholar +1 more source
High‐performance SEBS‐PFB AEM is developed by crosslinking SEBS‐amine with polyfluorene‐based crosslinker containing benzene spacer. With the superior electrochemical and mechanical properties, SEBS‐PFB enabled an AEMWE single cell to achieve a high current density of 14.0 A cm−2 at 2.0 V and 80 °C in 1 m KOH, using a PtRu/C cathode and Ni2Fe anode ...
Hyun Soo Kwon +8 more
wiley +1 more source
A minimally invasive, transepithelial corneal cross‐linking (TE‐CXL) approach is presented using upconversion nanoparticles (UCNPs)‐loaded contact lenses (UCLs), after topical delivery of hyaluronate–riboflavin conjugates. The NIR‐to‐UV/blue light conversion by UCNPs in a UCL can activate riboflavin for TE‐CXL, resulting in the biomechanical strength ...
Gibum Lee +8 more
wiley +1 more source
Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment [PDF]
Ady Wahyudi Paundu +3 more
openalex +1 more source
Algebraic Side-Channel Attacks
In 2002, algebraic attacks using overdefined systems of equa- tions have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However, although a number of convinc- ing experiments have been performed against certain reduced algorithms, it is not clear whether these attacks can be successfully applied in gen- eral
Renauld, Mathieu +2 more
openaire +1 more source
Self‐Trapped Hole Migration and Defect‐Mediated Thermal Quenching of Luminescence in α‐ and β‐Ga2O3
Temperature‐dependent photoluminescence and first‐principles calculations reveal self‐trapped hole migration as the microscopic origin of thermal quenching in α‐ and β‐Ga2O3. The low migration barrier in α‐Ga2O3 enables defect trapping and enhances blue luminescence, while the higher barrier in β‐Ga2O3 preserves ultraviolet emission at elevated ...
Nima Hajizadeh +11 more
wiley +1 more source
Sensor side-channel attacks on user privacy: analysis and mitigation [PDF]
Narain
openalex +1 more source

