Results 101 to 110 of about 46,684 (278)

Cryptography: Symmetric Vs Asymmetric Encryption

open access: yes, 2018
With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social media, online transaction, application and business, organization across the globe produce too much amount of data every second. Data Security is the most basic and extreme measures to ensure secure passage of information through internet.
Mr. Anurag Rawal   +3 more
openaire   +1 more source

Engineered Protein‐Based Ionic Conductors for Sustainable Energy Storage Applications

open access: yesAdvanced Materials, EarlyView.
Rational incorporation of charged residues into an engineered, self‐assembling protein scaffold yields solid‐state protein films with outstanding ionic conductivity. Salt‐doping further enhances conductivity, an effect amplified in the engineered variants. These properties enable the material integration into an efficient supercapacitor.
Juan David Cortés‐Ossa   +14 more
wiley   +1 more source

Transistor‐Level Activation Functions via Two‐Gate Designs: From Analog Sigmoid and Gaussian Control to Real‐Time Hardware Demonstrations

open access: yesAdvanced Materials, EarlyView.
Screen gate‐based transistors are presented, enabling tunable analog sigmoid and Gaussian activations. The SA‐transistor improves MRI classification accuracy, while the GA‐transistor supports precise Gaussian kernel tuning for forecasting. Both functions are implemented in a single device, offering compact, energy‐efficient analog AI processing ...
Junhyung Cho   +9 more
wiley   +1 more source

Research on cloud storage systems supporting secure sharing

open access: yesTongxin xuebao, 2017
A practical scheme for the cloud storage system was proposed to ensure security and efficiency during data sharing.The scheme which combine attribute-based encryption,proxy encryption with symmetric encryption,could integrate access control,efficient ...
Yan SONG, Zhen HAN, Jian-jun LI, Lei HAN
doaj   +2 more sources

Opportunities of Semiconducting Oxide Nanostructures as Advanced Luminescent Materials in Photonics

open access: yesAdvanced Materials, EarlyView.
The review discusses the challenges of wide and ultrawide bandgap semiconducting oxides as a suitable material platform for photonics. They offer great versatility in terms of tuning microstructure, native defects, doping, anisotropy, and micro‐ and nano‐structuring. The review focuses on their light emission, light‐confinement in optical cavities, and
Ana Cremades   +7 more
wiley   +1 more source

Directional Flow of Confined Polaritons in CrSBr

open access: yesAdvanced Materials, EarlyView.
CrSBr, a layered magnetic semiconductor, naturally channels self‐hybridized excitonpolaritons into highly directional flow. Its intrinsic optical anisotropy, high refractive index, and strong lightmatter coupling enable long‐range guided modes along the a‐axis, with propagation lengths set by their excitonphoton admixture.
Pratap Chandra Adak   +10 more
wiley   +1 more source

Intelligent Acousto‐Electrical Metamaterials (IAM) for Sound Source Detection

open access: yesAdvanced Materials, EarlyView.
Our proposed metamaterial concept enables sound source detection using a single material, in contrast to conventional arrays that require dozens or even hundreds of transducers. We show that the coupled acoustic–vibrational–electrical responses in piezoelectric metamaterials give rise to topology‐governed charge transport, producing distinct voltage ...
Victor Couëdel   +7 more
wiley   +1 more source

Cloud data secure deduplication scheme via role-based symmetric encryption

open access: yesTongxin xuebao, 2018
The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as ...
Jinbo XIONG   +5 more
doaj   +2 more sources

Symmetric Encryption – An Introduction

open access: yes, 2019
Many people place their trust in information provided by third parties when it comes to encryption. It's more common to take the apparent ins and outs at face value than to actually personally know them. It seems sensible to periodically process certain basic information. If in doubt, consult competent experts.
openaire   +1 more source

Light‐Induced Entropy for Secure Vision

open access: yesAdvanced Materials, EarlyView.
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy