Results 171 to 180 of about 3,519 (307)
Bacteria‐Responsive Nanostructured Drug Delivery Systems for Targeted Antimicrobial Therapy
Bacteria‐responsive nanocarriers are designed to release antimicrobials only in the presence of infection‐specific cues. This selective activation ensures drug release precisely at the site of infection, avoiding premature or indiscriminate release, and enhancing efficacy.
Guillermo Landa +3 more
wiley +1 more source
Semantic decentralized authentication for IoT-based e-learning using Hedera Hashgraph and Knowledge Graphs. [PDF]
Luo L, Zhang Y, Tang Q.
europepmc +1 more source
Supporting Material To "Sifa: Exploiting Ineffective Fault Inductions On Symmetric Cryptography"
Robert Primas, Thomas Korak
openalex +1 more source
A comparative review on symmetric and asymmetric DNA-based cryptography
Baraa Tareq Hammad +3 more
openalex +2 more sources
An Integrated Symmetric Key Cryptographic Method – Amalgamation of TTJSA Algorithm, Advanced Caesar Cipher Algorithm, Bit Rotation and Reversal method: SJA Algorithm [PDF]
Somdip Dey, Joyshree Nath, Asoke Nath
openalex +1 more source
Magnetic doping of the topological insulator Bi2Te3 with erbium adatoms induces out‐of‐plane magnetism and breaks time‐reversal symmetry, opening a Dirac gap and driving a Fermi surface transition from hexagonal to star‐of‐David geometry. Microscopy, spectroscopy, and magnetic dichroism reveal atomically controlled magnetic interactions that tailor the
Beatriz Muñiz Cano +18 more
wiley +1 more source
Lightweight image encryption for wireless sensor networks using optimized elliptic curve and fuzzy logic. [PDF]
Zarei M +3 more
europepmc +1 more source
The water permeability of amorphous carbon dots (CDs) is demonstrated by investigating their plasticization. Novel polyamide‐based and amorphous nanoparticles are synthesized by controlling their inner packing density. Water plasticization is evidenced by the decrease of the CDs glass transition temperature with increasing the hydration degree.
Elisa Sturabotti +8 more
wiley +1 more source
Hybrid cryptographic approach for strengthening IoT and 5G/B5G network security. [PDF]
Kumar A, Singh P, Kamble DP, Singh I.
europepmc +1 more source

