Results 101 to 110 of about 46,684 (278)
Cryptography: Symmetric Vs Asymmetric Encryption
With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social media, online transaction, application and business, organization across the globe produce too much amount of data every second. Data Security is the most basic and extreme measures to ensure secure passage of information through internet.
Mr. Anurag Rawal +3 more
openaire +1 more source
Engineered Protein‐Based Ionic Conductors for Sustainable Energy Storage Applications
Rational incorporation of charged residues into an engineered, self‐assembling protein scaffold yields solid‐state protein films with outstanding ionic conductivity. Salt‐doping further enhances conductivity, an effect amplified in the engineered variants. These properties enable the material integration into an efficient supercapacitor.
Juan David Cortés‐Ossa +14 more
wiley +1 more source
Screen gate‐based transistors are presented, enabling tunable analog sigmoid and Gaussian activations. The SA‐transistor improves MRI classification accuracy, while the GA‐transistor supports precise Gaussian kernel tuning for forecasting. Both functions are implemented in a single device, offering compact, energy‐efficient analog AI processing ...
Junhyung Cho +9 more
wiley +1 more source
Research on cloud storage systems supporting secure sharing
A practical scheme for the cloud storage system was proposed to ensure security and efficiency during data sharing.The scheme which combine attribute-based encryption,proxy encryption with symmetric encryption,could integrate access control,efficient ...
Yan SONG, Zhen HAN, Jian-jun LI, Lei HAN
doaj +2 more sources
Opportunities of Semiconducting Oxide Nanostructures as Advanced Luminescent Materials in Photonics
The review discusses the challenges of wide and ultrawide bandgap semiconducting oxides as a suitable material platform for photonics. They offer great versatility in terms of tuning microstructure, native defects, doping, anisotropy, and micro‐ and nano‐structuring. The review focuses on their light emission, light‐confinement in optical cavities, and
Ana Cremades +7 more
wiley +1 more source
Directional Flow of Confined Polaritons in CrSBr
CrSBr, a layered magnetic semiconductor, naturally channels self‐hybridized excitonpolaritons into highly directional flow. Its intrinsic optical anisotropy, high refractive index, and strong lightmatter coupling enable long‐range guided modes along the a‐axis, with propagation lengths set by their excitonphoton admixture.
Pratap Chandra Adak +10 more
wiley +1 more source
Intelligent Acousto‐Electrical Metamaterials (IAM) for Sound Source Detection
Our proposed metamaterial concept enables sound source detection using a single material, in contrast to conventional arrays that require dozens or even hundreds of transducers. We show that the coupled acoustic–vibrational–electrical responses in piezoelectric metamaterials give rise to topology‐governed charge transport, producing distinct voltage ...
Victor Couëdel +7 more
wiley +1 more source
Cloud data secure deduplication scheme via role-based symmetric encryption
The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as ...
Jinbo XIONG +5 more
doaj +2 more sources
Symmetric Encryption – An Introduction
Many people place their trust in information provided by third parties when it comes to encryption. It's more common to take the apparent ins and outs at face value than to actually personally know them. It seems sensible to periodically process certain basic information. If in doubt, consult competent experts.
openaire +1 more source
Light‐Induced Entropy for Secure Vision
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo +9 more
wiley +1 more source

