Results 101 to 110 of about 15,368 (325)

Using Long‐Chain Polymechanophores to Explore the Differences in Mechanoactivation During Nozzle Flow and Ultrasonication

open access: yesAdvanced Functional Materials, EarlyView.
Flow through a nozzle is a common component of most fluid‐based polymer processing techniques such as spray drying, inkjet printing, extrusion. An ultrahigh molecular weight multi‐mechanophore system is used to probe the differences in the distribution of mechanical activation observed between nozzle flow and ultrasonication; the gold standard ...
Niamh Willis‐Fox   +4 more
wiley   +1 more source

Semi-Trusted Mixer Based Privacy Preserving Distributed Data Mining for Resource Constrained Devices [PDF]

open access: yes, 2010
In this paper a homomorphic privacy preserving association rule mining algorithm is proposed which can be deployed in resource constrained devices (RCD).
Kaosar, Md. Golam, Yi, Xun
core   +1 more source

Metal–Organic Frameworks for Gaseous Pollutant Management: From Capture to Neutralization and Reutilization

open access: yesAdvanced Functional Materials, EarlyView.
This review maps how MOFs can manage hazardous gases by combining adsorption, neutralization, and reutilization, enabling sustainable air‐pollution control. Covering chemical warfare agent simulants, SO2, NOx, NH3, H2S, and volatile organic compounds, it highlights structure‐guided strategies that boost selectivity, water tolerance, and cycling ...
Yuanmeng Tian   +8 more
wiley   +1 more source

Execution Integrity with In-Place Encryption

open access: yes, 2017
Instruction set randomization (ISR) was initially proposed with the main goal of countering code-injection attacks. However, ISR seems to have lost its appeal since code-injection attacks became less attractive because protection mechanisms such as data ...
Arias, Orlando   +5 more
core  

Correlation Attack on A5/1 [PDF]

open access: yes, 2015
Popis šifry A5/1, základních kryptografických útoků a rozbor útoku korelační metodou. Tato práce bude prospěšná každému, kdo se bude zajímat o proudové šifry, základní myšlenky kryptografických útoků a speciálně myšlenku útoku korelační metodou ...
Holec Martin
core  

Bioprinting Organs—Science or Fiction?—A Review From Students to Students

open access: yesAdvanced Healthcare Materials, EarlyView.
Bioprinting artificial organs has the potential to revolutionize the medical field. This is a comprehensive review of the bioprinting workflow delving into the latest advancements in bioinks, materials and bioprinting techniques, exploring the critical stages of tissue maturation and functionality.
Nicoletta Murenu   +18 more
wiley   +1 more source

Fault Attacks on the Authenticated Encryption Stream Cipher MORUS

open access: yesCryptography, 2018
This paper investigates the application of fault attacks to the authenticated encryption stream cipher algorithm MORUS. We propose fault attacks on MORUS with two different goals: one to breach the confidentiality component, and the other to breach the ...
Iftekhar Salam   +4 more
doaj   +1 more source

Provable security against generic attacks on stream ciphers

open access: yesJournal of Mathematical Cryptology, 2023
Abstract Recent lightweight hardware-based stream cipher designs keep an external non-volatile internal state that is not part of the cipher’s hardware module. The purpose of these so-called small-state ciphers is to keep the size of the hardware and the power consumption low. We propose a random oracle model for stream ciphers.
openaire   +4 more sources

Smart Catheters for Diagnosis, Monitoring, and Therapy

open access: yesAdvanced Healthcare Materials, EarlyView.
This study presents a comprehensive review of smart catheters, an emerging class of medical devices that integrate embedded sensors, robotics, and communication systems, offering increased functionality and complexity to enable real‐time health monitoring, diagnostics, and treatment. Abstract This review explores smart catheters as an emerging class of
Azra Yaprak Tarman   +12 more
wiley   +1 more source

Home - About - Disclaimer - Privacy