Results 81 to 90 of about 48,518 (327)
Adaptive authentication and key agreement mechanism for future cellular systems [PDF]
Since the radio medium can be accessed by anyone, authentication of users is a very important element of a mobile network. Nowadays, in GSM/GPRS a challenge response protocol is used to authenticate the user to the mobile network.
Dimitriou, T., Komninos, N.
core
Nonce-Based Symmetric Encryption [PDF]
Symmetric encryption schemes are usually formalized so as to make the encryption operation a probabilistic or state-dependent function e of the message M and the key K: the user supplies M and K and the encryption process does the rest, flipping coins or modifying internal state in order to produce a ciphertext C.
openaire +1 more source
Electrolyte Design Strategies for Static Shuttle‐Free and Long‐Life Aqueous Zinc‐Iodine Batteries
This review systematically summarizes recent advances in electrolyte design for static aqueous Zn‐I2 batteries, highlighting solvation regulation and interfacial engineering strategies to control reaction kinetics, suppress iodine shuttling, enhance energy density, and stabilize multi‐electron iodine redox chemistry for durable, high‐performance energy
Qianqin Zhou +3 more
wiley +1 more source
Hiding Symbols and Functions: New Metrics and Constructions for Information-Theoretic Security [PDF]
We present information-theoretic definitions and results for analyzing symmetric-key encryption schemes beyond the perfect secrecy regime, i.e. when perfect secrecy is not attained. We adopt two lines of analysis, one based on lossless source coding, and
Calmon, Flavio du Pin +5 more
core +1 more source
Atomic Layer Deposition in Transistors and Monolithic 3D Integration
Transistors are fundamental building blocks of modern electronics. This review summarizes recent progress in atomic layer deposition (ALD) for the synthesis of two‐dimensional (2D) metal oxides and transition‐metal dichalcogenides (TMDCs), with particular emphasis on their enabling role in monolithic three‐dimensional (M3D) integration for next ...
Yue Liu +5 more
wiley +1 more source
State of The Art and Hot Aspects in Cloud Data Storage Security [PDF]
Along with the evolution of cloud computing and cloud storage towards matu- rity, researchers have analyzed an increasing range of cloud computing security aspects, data security being an important topic in this area.
Gehrmann, Christian +2 more
core +3 more sources
Unlocking Photodetection Mode Switching from a Simple Lateral Design
A simple lateral 2D perovskite photodetector capable of switching among transient, continuous, and dual transient/continuous photoresponse modes is achieved by integrating photoconductive effects with capacitive coupling from the SiO2/Si substrate. Such light‐programmable photodetection mode switching enables triple‐channel information transmission and
Zijun (June) Yong +10 more
wiley +1 more source
Measurement of Symmetric Cipher on Low Power Devices for Power Grids [PDF]
The symmetric ciphers are often used in low power devices for its low requirements. This article provides a measurement of AES-128 cipher, which should be used for secure communication in power grid (smart grid) networks.
Fujdiak, R.
core
This work develops 3D‐printable tribopolymer networks that can enhance triboelectric performance under high humidity environments. Polar hydrophilic functional groups and incorporation of zwitterionic monomers promote bound‐water–dominated interfacial polarization thereby increasing electrical outputs.
Linguangze Zhuo +8 more
wiley +1 more source
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency [PDF]
Recently, several practical attacks raised serious concerns over the security of searchable encryption. The attacks have brought emphasis on forward privacy, which is the key concept behind solutions to the adaptive leakage-exploiting attacks, and will ...
Dong, Changyu +4 more
core +1 more source

