Results 71 to 80 of about 349,795 (327)
This work discusses the use of blended channel materials in OECTs. It explores how mixing glycolated and alkoxylated polymers in various ratios offers a simpler and more efficient route to tuning OECT properties. The performance of the polymer blends is compared to the corresponding copolymers, demonstrating similar OECT characteristics, swelling ...
Lize Bynens +14 more
wiley +1 more source
Task Parameters Analysis in Schedule-Based Timing Side-Channel Attack
Recent work has shown that the timing behavior of a real-time system can be utilized by attackers for various adverse purposes via schedule-based timing side-channel attacks.
Songran Liu, Wang Yi
doaj +1 more source
On the Machine Learning Techniques for Side-channel Analysis [PDF]
Side-channel attacks represent one of the most powerful category of attacks on cryptographic devices with profiled attacks in a prominent place as the most powerful among them.
Guilley, Sylvain +2 more
core
This work explores Li‐substituted P2 layered oxides for Na‐ion batteries by crystallographic and electrochemical studies. The effect of lithium on superstructure orderings, on phase transitions during synthesis and electrochemical cycling and on the interplay of O‐ versus TM‐redox is revealed via various advanced techniques, including semi‐simultaneous
Mingfeng Xu +5 more
wiley +1 more source
Coating the standard polypropylene separator with a porous red phosphorous nanosheet greatly improves cycling performance in Li electrode cells. The phosphorus‐based surface chemistry deactivates electrolyte solvent decomposition and enhances the cleavage of F‐containing salt, resulting in an inorganic‐dominated electrolyte interphase (SEI) composition
Jiangpeng Wang +9 more
wiley +1 more source
Attacks on IoT: Side-Channel Power Acquisition Framework for Intrusion Detection [PDF]
Dominic Lightbody +4 more
openalex +1 more source
Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels
We show that subtle acoustic noises emanating from within computer screens can be used to detect the content displayed on the screens. This sound can be picked up by ordinary microphones built into webcams or screens, and is inadvertently transmitted to ...
Genkin, Daniel +3 more
core +1 more source
Atomic Size Misfit for Electrocatalytic Small Molecule Activation
This review explores the application and mechanisms of atomic size misfit in catalysis for small molecule activation, focusing on how structural defects and electronic properties can effectively lower the energy barriers of chemical bonds in molecules like H2O, CO2, and N2.
Ping Hong +3 more
wiley +1 more source
Mitigating Timing Side-Channel Attacks in Software-Defined Networks: Detection and Response [PDF]
Faizan Shoaib +3 more
openalex +1 more source
Power analysis attack on masked AES implementation [PDF]
Šifrovací algoritmy jsou dnes běžně používaným zabezpečovacím prvkem. V některých situacích je algoritmus provozován na speciálním modulu, aby nedocházelo k útokům pomocí internetu.
Jakubíková, Radka
core

