Results 121 to 130 of about 49,036 (287)
Among known cryptographic systems, in practice, symmetric cryptographic systems are most often used to protect speech information. Such systems, when encrypting speech information, implement stream encryption of outgoing traffic.
Ольга Грищук
doaj +1 more source
Transition metal oxy/carbo‐nitrides show great promise as catalysts for sustainable processes. A Mn‐Mo mixed‐metal oxynitride attains remarkable performance for the direct synthesis of acetonitrile, an important commodity chemical, via sequential C─N and C─C coupling from syngas (C1) and ammonia (N1) feedstocks.
M. Elena Martínez‐Monje +7 more
wiley +1 more source
Bacteria‐Responsive Nanostructured Drug Delivery Systems for Targeted Antimicrobial Therapy
Bacteria‐responsive nanocarriers are designed to release antimicrobials only in the presence of infection‐specific cues. This selective activation ensures drug release precisely at the site of infection, avoiding premature or indiscriminate release, and enhancing efficacy.
Guillermo Landa +3 more
wiley +1 more source
Magnetic doping of the topological insulator Bi2Te3 with erbium adatoms induces out‐of‐plane magnetism and breaks time‐reversal symmetry, opening a Dirac gap and driving a Fermi surface transition from hexagonal to star‐of‐David geometry. Microscopy, spectroscopy, and magnetic dichroism reveal atomically controlled magnetic interactions that tailor the
Beatriz Muñiz Cano +18 more
wiley +1 more source
The water permeability of amorphous carbon dots (CDs) is demonstrated by investigating their plasticization. Novel polyamide‐based and amorphous nanoparticles are synthesized by controlling their inner packing density. Water plasticization is evidenced by the decrease of the CDs glass transition temperature with increasing the hydration degree.
Elisa Sturabotti +8 more
wiley +1 more source
A survey on the security technology of edge computing
With the continuous development of Internet of things applications,a large number of mobile terminal devices participate in service computing.Traditional cloud computing models cannot adapt to the rapid growth of data generated by network edge devices ...
Jie LING +3 more
doaj
Symmetric Cryptography (Dagstuhl Seminar 20041)
This report documents the program and the outcomes of Dagstuhl Seminar 20041 "Symmetric Cryptography". The seminar was held on January 19-24, 2020 in Schloss Dagstuhl - Leibniz Center for Informatics. This was the seventh seminar in the series "Symmetric Cryptography". Previous editions were held in 2007, 2009, 2012, 2014, 2016, and 2018.
Leander, Nils Gregor +3 more
openaire +2 more sources
This study shows that alkaline leaching of PrBa0.8Ca0.2Co2O5+δ under anodic bias selectively removes Ba and Ca, forming a cobalt‐rich and amorphous layer. The modified surface significantly boosts ORR activity, offering a simple and effective strategy to improve electrochemical device performance.
Yeongtaek Hong +11 more
wiley +1 more source
Research on the application of quantum-secure algorithms in 5G network
With the widespread application of 5G networks, data transmission speed and capacity have been significantly improved, promoting innovative development in fields such as the Internet of things, autonomous driving, and telemedicine.
WANG Congli +5 more
doaj
Synthesis of symmetric paths of arbiter physically unclonable function on FPGA
Physical cryptography is one of the current trends among the existing methods of protecting digital devices from illegal access. Circuit design solutions in physical cryptography are called digital physically unclonable functions (PUFs), which to be ...
A. A. Ivaniuk
doaj

