Results 51 to 60 of about 39,218 (293)

Implementasi Protokol Diffie-Hellman Dan Algoritma RC4 Untuk Keamanan Pesan SMS

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2015
Abstrack— SMS now becomes such a need for cellular phone users to communicate to other people. But the cellular phone users do not realize that the sent messages could be intercepted or changed by an unwanted party.
Decky Hendarsyah, Retantyo Wardoyo
doaj   +1 more source

Investigation of Iron‐Aluminide‐Like Phase Composition in Complex Concentrated Fe32Cu12Ni11Ti16Al29 Alloy

open access: yesAdvanced Engineering Materials, EarlyView.
This work reveals the phase composition and quantitative morphology analysis of precipitation‐hardened Fe32Cu12Ni11Ti16Al29 complex‐concentrated alloy. The precipitates are shown to have a high coherency. Morphology transition between sphere, cuboidal, and elongated morphology is observed. Finally, the overaging behavior is captured using microhardness.
Rostyslav Nizinkovskyi   +4 more
wiley   +1 more source

Novel Surface‐Based Bézier Metamaterials: A Higher Degree of Parametrization toward Tailoring the Effective Properties under Compression

open access: yesAdvanced Engineering Materials, EarlyView.
Cubic Bézier curves are used in the synthesis of novel surface‐based metamaterials with tunable mechanical properties. Surface‐based geometries are 3D printed and tested in compression. The resulting mechanical properties are correlated to changes in the shape of the base curve, with high potential in energy absorption through the adjustment of their ...
Alberto Álvarez‐Trejo   +2 more
wiley   +1 more source

A New Encryption Algorithm Using Symmetric Key Cryptography

open access: yesInternational Journal of Engineering & Technology, 2018
Cryptographic techniques are primarily divided into two categories and they are: Symmetric key type and Asymmetric key type. In Symmetric key cryptography, during the process of encryption and decryption, the same key will be used. This is a conventional method of Cryptography.
Manogna T   +3 more
openaire   +3 more sources

On the Investigation of a Sustainable Two Step Laser‐Based Surface Treatment for the Functionalization of Additive Manufactured Ti–6Al–4V Components

open access: yesAdvanced Engineering Materials, EarlyView.
This study developed a two‐step laser‐based process for sustainable surface treatment of Ti–6Al–4 V components, combining laser polishing and direct laser interference patterning with ns and ps pulses. Key findings include significant roughness reduction, hierarchical patterning with ps pulses, and improved homogeneity. A cost function is developed for
Ignacio Tabares   +7 more
wiley   +1 more source

Images Encryption Method using Steganographic LSB Method, AES and RSA algorithm

open access: yesNonlinear Engineering, 2017
Vulnerability of communication of digital images is an extremely important issue nowadays, particularly when the images are communicated through insecure channels.
Moumen Abdelkader, Sissaoui Hocine
doaj   +1 more source

Poly(1,4‐anthraquinone) as an Organic Electrode Material: Interplay of the Electronic and Structural Properties due to the Unusual Lone‐Pair‐π Conjugation

open access: yesAdvanced Functional Materials, Volume 35, Issue 12, March 18, 2025.
In this study, the unique role of the unusual lone‐pair‐π conjugation mechanism in poly(1,4‐anthraquinone) (P14AQ) is explored as an organic electrode material. Unlike traditional π‐π interactions, P14AQ's conjugation involves lone pairs of oxygen atoms interacting with the π cloud of adjacent units, enabling stable charge transport even with minimal π‐
Xiaotong Zhang, Piotr de Silva
wiley   +1 more source

Experimental authentication of quantum key distribution with post-quantum cryptography

open access: yesnpj Quantum Information, 2021
Quantum key distribution (QKD) can provide information theoretically secure key exchange even in the era of quantum computers. However, QKD requires the classical channel to be authenticated, the current method for which is pre-sharing symmetric keys ...
Liu-Jun Wang   +11 more
doaj   +1 more source

Synchrotron Radiation for Quantum Technology

open access: yesAdvanced Functional Materials, EarlyView.
Materials and interfaces underpin quantum technologies, with synchrotron and FEL methods key to understanding and optimizing them. Advances span superconducting and semiconducting qubits, 2D materials, and topological systems, where strain, defects, and interfaces govern performance.
Oliver Rader   +10 more
wiley   +1 more source

Quantum Chosen-Cipher Attack on Camellia

open access: yesMathematics
The Feistel structure represents a fundamental architectural component within the domain of symmetric cryptographic algorithms, with a substantial body of research conducted within the context of classical computing environments.
Yanjun Li   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy