Results 81 to 90 of about 46,684 (278)
A Layered Approach For Improved Cloud Storage Security And Protection Of Access Policy [PDF]
Information technology provides a service called cloud computing, which offers many beneficial functions. But there are a lot of problems and drawbacks with cloud computing, the most significant of which is the uncertainty and possible danger presented ...
Venkata Rama Lakshmi Gundala +4 more
doaj +1 more source
Photon Avalanching Nanoparticles: The Next Generation of Upconverting Nanomaterials?
This Perspective outlines the mechanistic foundations that enable photon‐avalanche (PA) behavior in lanthanide nanomaterials and contrasts them with emerging application spaces and forward‐looking design strategies. By bridging threshold engineering, energy‐transfer dynamics, and materials engineering, we provide a coherent roadmap for advancing the ...
Kimoon Lee +7 more
wiley +1 more source
A hybrid encryption approach for efficient and secure data transmission in IoT devices
Security is a crucial concern in the Internet of Things (IoT) ecosystem. Due to IoT devices' constrained processing and storage resources, providing reliable security solutions is challenging.
Limin Zhang, Li Wang
doaj +1 more source
A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher
Image encryption is rapidly increased recently by the increasing use of the internet and communication media. Sharing important images over unsecured channels is liable for attacking and stealing. Encryption techniques are the suitable methods to protect
Ziad E. Dawahdeh +2 more
doaj +1 more source
Nonce-Based Symmetric Encryption [PDF]
Symmetric encryption schemes are usually formalized so as to make the encryption operation a probabilistic or state-dependent function e of the message M and the key K: the user supplies M and K and the encryption process does the rest, flipping coins or modifying internal state in order to produce a ciphertext C.
openaire +1 more source
Clean Up Behind You ‐ Novel Patterning Approach for Solid Immersion Lenses
A focused ion beam (FIB) milling strategy enables rapid fabrication of solid immersion lenses (SILs) with smooth, debris‐free surfaces eliminating the need for post‐processing. The optimized pattern improves efficiency and surface quality. SILs containing NV centers are also investigated, confirming the technique's suitability for quantum and photonic ...
Aleksei Tsarapkin +10 more
wiley +1 more source
Shape‐Changing Multiphase Microparticles from Complex Liquid Crystal Emulsions
Liquid crystalline network (LCN) microparticles are prepared from single, double (Janus), and triple emulsions through a simple and scalable bulk‐emulsification strategy. Under heating, the particles exhibit robust, reversible, large‐amplitude deformations that depend both on the morphology and the liquid crystals director field configuration.
Marco Turriani +3 more
wiley +1 more source
ПРИМЕНЕНИЕ ЗАПУТЫВАЮЩИХ ПРЕОБРАЗОВАНИЙ В КРИПТОГРАФИИ
The author considers various aspects of obfuscation technique towards white-box cryptography and its application for DRM solutions. This paper covers questions related with transforming symmetric encryption schemes into asymmetric and designing ...
Евгений Юрьевич Родионов
doaj
CSI-based symmetric encryption end-to-end communication system [PDF]
To address the issue of information leakage caused by key theft during transmission, a symmetric encryption end-to-end communication system based on channel state information (CSI) was proposed.
Yongli AN +3 more
doaj +1 more source
Property Preserving Symmetric Encryption Revisited [PDF]
At EUROCRYPTi¾?2012 Pandey and Rouselakis introduced the notion of property preserving symmetric encryption which enables checking for a property on plaintexts by running a public test on the corresponding ciphertexts. Their primary contributions are: i a separation between 'find-then-guess' and 'left-or-right' security notions; ii a concrete ...
Sanjit Chatterjee, M. Prem Laxman Das
openaire +1 more source

