Results 51 to 60 of about 39,218 (293)
Implementasi Protokol Diffie-Hellman Dan Algoritma RC4 Untuk Keamanan Pesan SMS
Abstrack— SMS now becomes such a need for cellular phone users to communicate to other people. But the cellular phone users do not realize that the sent messages could be intercepted or changed by an unwanted party.
Decky Hendarsyah, Retantyo Wardoyo
doaj +1 more source
This work reveals the phase composition and quantitative morphology analysis of precipitation‐hardened Fe32Cu12Ni11Ti16Al29 complex‐concentrated alloy. The precipitates are shown to have a high coherency. Morphology transition between sphere, cuboidal, and elongated morphology is observed. Finally, the overaging behavior is captured using microhardness.
Rostyslav Nizinkovskyi +4 more
wiley +1 more source
Cubic Bézier curves are used in the synthesis of novel surface‐based metamaterials with tunable mechanical properties. Surface‐based geometries are 3D printed and tested in compression. The resulting mechanical properties are correlated to changes in the shape of the base curve, with high potential in energy absorption through the adjustment of their ...
Alberto Álvarez‐Trejo +2 more
wiley +1 more source
A New Encryption Algorithm Using Symmetric Key Cryptography
Cryptographic techniques are primarily divided into two categories and they are: Symmetric key type and Asymmetric key type. In Symmetric key cryptography, during the process of encryption and decryption, the same key will be used. This is a conventional method of Cryptography.
Manogna T +3 more
openaire +3 more sources
This study developed a two‐step laser‐based process for sustainable surface treatment of Ti–6Al–4 V components, combining laser polishing and direct laser interference patterning with ns and ps pulses. Key findings include significant roughness reduction, hierarchical patterning with ps pulses, and improved homogeneity. A cost function is developed for
Ignacio Tabares +7 more
wiley +1 more source
Images Encryption Method using Steganographic LSB Method, AES and RSA algorithm
Vulnerability of communication of digital images is an extremely important issue nowadays, particularly when the images are communicated through insecure channels.
Moumen Abdelkader, Sissaoui Hocine
doaj +1 more source
In this study, the unique role of the unusual lone‐pair‐π conjugation mechanism in poly(1,4‐anthraquinone) (P14AQ) is explored as an organic electrode material. Unlike traditional π‐π interactions, P14AQ's conjugation involves lone pairs of oxygen atoms interacting with the π cloud of adjacent units, enabling stable charge transport even with minimal π‐
Xiaotong Zhang, Piotr de Silva
wiley +1 more source
Experimental authentication of quantum key distribution with post-quantum cryptography
Quantum key distribution (QKD) can provide information theoretically secure key exchange even in the era of quantum computers. However, QKD requires the classical channel to be authenticated, the current method for which is pre-sharing symmetric keys ...
Liu-Jun Wang +11 more
doaj +1 more source
Synchrotron Radiation for Quantum Technology
Materials and interfaces underpin quantum technologies, with synchrotron and FEL methods key to understanding and optimizing them. Advances span superconducting and semiconducting qubits, 2D materials, and topological systems, where strain, defects, and interfaces govern performance.
Oliver Rader +10 more
wiley +1 more source
Quantum Chosen-Cipher Attack on Camellia
The Feistel structure represents a fundamental architectural component within the domain of symmetric cryptographic algorithms, with a substantial body of research conducted within the context of classical computing environments.
Yanjun Li +4 more
doaj +1 more source

