Results 91 to 100 of about 49,036 (287)

Meta‐Rod Mechanical Metamaterials With Programmable Reconfiguration

open access: yesAdvanced Functional Materials, EarlyView.
Existing mechanical metamaterials achieve programmable large deformations in planar square or cubic configurations, restricted by required complex boundary conditions. This research proposes a 1D metamaterial, Meta‐rod, with linear, bending, twisting, area, and volume deformation modes.
Atharva Pande, Lyes Kadem, Hang Xu
wiley   +1 more source

Performance Evaluation of NIST-Standardized Post-Quantum and Symmetric Ciphers for Mitigating Deepfakes

open access: yesCryptography
Deepfake technology can produce highly realistic manipulated media which pose as significant cybersecurity threats, including fraud, misinformation, and privacy violations.
Mohammad Alkhatib
doaj   +1 more source

2D Magnetic and Topological Quantum Materials and Devices for Ultralow Power Spintronics

open access: yesAdvanced Functional Materials, EarlyView.
2D magnets and topological quantum materials enable ultralow‐power spintronics by combining robust magnetic order with symmetry‐protected, Berry‐curvature‐driven transport. Fundamentals of 2D anisotropy and spin‐orbit‐coupling induced band inversion are linked to scalable growth and vdW stacking.
Brahmdutta Dixit   +5 more
wiley   +1 more source

Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups [PDF]

open access: yes, 2014
The main practical limitation of the McEliece public-key encryption scheme is probably the size of its key. A famous trend to overcome this issue is to focus on subclasses of alternant/Goppa codes with a non trivial automorphism group. Such codes display
de Portzamparc, Frédéric   +4 more
core   +2 more sources

VISUAL SYMMETRIC SPEECH CRYPTOGRAPHY

open access: yesInternational Journal of Advanced Research in Computer Science, 2018
Today Communication is mainly depends upon digital data communication.  Data is sent across internet using sequence of bits. Data integrity is major issue in such a communication. To preserve data integrity of the message sent over the internet various method of cryptography is used.
openaire   +2 more sources

Photon Avalanching Nanoparticles: The Next Generation of Upconverting Nanomaterials?

open access: yesAdvanced Functional Materials, EarlyView.
This Perspective outlines the mechanistic foundations that enable photon‐avalanche (PA) behavior in lanthanide nanomaterials and contrasts them with emerging application spaces and forward‐looking design strategies. By bridging threshold engineering, energy‐transfer dynamics, and materials engineering, we provide a coherent roadmap for advancing the ...
Kimoon Lee   +7 more
wiley   +1 more source

ПРИМЕНЕНИЕ ЗАПУТЫВАЮЩИХ ПРЕОБРАЗОВАНИЙ В КРИПТОГРАФИИ

open access: yesБезопасность информационных технологий, 2009
The author considers various aspects of obfuscation technique towards white-box cryptography and its application for DRM solutions. This paper covers questions related with transforming symmetric encryption schemes into asymmetric and designing ...
Евгений Юрьевич Родионов
doaj  

Halide‐Dependent Photoluminescence and Heavy‐Atom Effects in Low‐Melting Organic–Inorganic Manganese Halides

open access: yesAdvanced Functional Materials, EarlyView.
Two pyridinium‐based ionic liquid templated hybrid manganese halides, (C4Py)2[MnCl4] and (C4Py)2[MnBr4], display similar bulk structures but show significantly different photoluminescence behaviors due to the bromine heavy‐atom effect. Their stable local Mn environments remain intact even in the molten state, allowing applications such as luminescence ...
Biswajit Bhattacharyya   +22 more
wiley   +1 more source

LL‐37 Driven Phase Transition and Stacking in Oligolamellar Gram‐Negative Bacterial Membrane Models

open access: yesAdvanced Functional Materials, EarlyView.
This work establishes oligolamellar bacterial membrane models to investigate how LL‐37 disrupts the complex dual‐bilayer architecture of Gram‐negative bacteria. Combining SAXS, cryo‐TEM, electrophoretic mobility measurements, and coarse‐grained simulations, it reveals cardiolipin‐driven phase transitions leading to bicelle‐like structures and membrane ...
Bettina Tran   +5 more
wiley   +1 more source

Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing

open access: yesIEEE Access
Cloud computing is a fast-growing industry that offers various online services, including software, computing resources, and databases. Its payment model is usage-based, whereas consistency is based on resource-sharing.
K. Sasikumar, Sivakumar Nagarajan
doaj   +1 more source

Home - About - Disclaimer - Privacy