Results 101 to 110 of about 15,368 (325)
Flow through a nozzle is a common component of most fluid‐based polymer processing techniques such as spray drying, inkjet printing, extrusion. An ultrahigh molecular weight multi‐mechanophore system is used to probe the differences in the distribution of mechanical activation observed between nozzle flow and ultrasonication; the gold standard ...
Niamh Willis‐Fox +4 more
wiley +1 more source
Semi-Trusted Mixer Based Privacy Preserving Distributed Data Mining for Resource Constrained Devices [PDF]
In this paper a homomorphic privacy preserving association rule mining algorithm is proposed which can be deployed in resource constrained devices (RCD).
Kaosar, Md. Golam, Yi, Xun
core +1 more source
This review maps how MOFs can manage hazardous gases by combining adsorption, neutralization, and reutilization, enabling sustainable air‐pollution control. Covering chemical warfare agent simulants, SO2, NOx, NH3, H2S, and volatile organic compounds, it highlights structure‐guided strategies that boost selectivity, water tolerance, and cycling ...
Yuanmeng Tian +8 more
wiley +1 more source
Simulated Leakage Power Analysis Attack of the Trivium Stream Cipher
Kenneth Palma, Francesc Moll
openalex +2 more sources
Execution Integrity with In-Place Encryption
Instruction set randomization (ISR) was initially proposed with the main goal of countering code-injection attacks. However, ISR seems to have lost its appeal since code-injection attacks became less attractive because protection mechanisms such as data ...
Arias, Orlando +5 more
core
Correlation Attack on A5/1 [PDF]
Popis šifry A5/1, základních kryptografických útoků a rozbor útoku korelační metodou. Tato práce bude prospěšná každému, kdo se bude zajímat o proudové šifry, základní myšlenky kryptografických útoků a speciálně myšlenku útoku korelační metodou ...
Holec Martin
core
Bioprinting Organs—Science or Fiction?—A Review From Students to Students
Bioprinting artificial organs has the potential to revolutionize the medical field. This is a comprehensive review of the bioprinting workflow delving into the latest advancements in bioinks, materials and bioprinting techniques, exploring the critical stages of tissue maturation and functionality.
Nicoletta Murenu +18 more
wiley +1 more source
Fault Attacks on the Authenticated Encryption Stream Cipher MORUS
This paper investigates the application of fault attacks to the authenticated encryption stream cipher algorithm MORUS. We propose fault attacks on MORUS with two different goals: one to breach the confidentiality component, and the other to breach the ...
Iftekhar Salam +4 more
doaj +1 more source
Provable security against generic attacks on stream ciphers
Abstract Recent lightweight hardware-based stream cipher designs keep an external non-volatile internal state that is not part of the cipher’s hardware module. The purpose of these so-called small-state ciphers is to keep the size of the hardware and the power consumption low. We propose a random oracle model for stream ciphers.
openaire +4 more sources
Smart Catheters for Diagnosis, Monitoring, and Therapy
This study presents a comprehensive review of smart catheters, an emerging class of medical devices that integrate embedded sensors, robotics, and communication systems, offering increased functionality and complexity to enable real‐time health monitoring, diagnostics, and treatment. Abstract This review explores smart catheters as an emerging class of
Azra Yaprak Tarman +12 more
wiley +1 more source

