Results 81 to 90 of about 48,518 (327)

Adaptive authentication and key agreement mechanism for future cellular systems [PDF]

open access: yes, 2006
Since the radio medium can be accessed by anyone, authentication of users is a very important element of a mobile network. Nowadays, in GSM/GPRS a challenge response protocol is used to authenticate the user to the mobile network.
Dimitriou, T., Komninos, N.
core  

Nonce-Based Symmetric Encryption [PDF]

open access: yes, 2004
Symmetric encryption schemes are usually formalized so as to make the encryption operation a probabilistic or state-dependent function e of the message M and the key K: the user supplies M and K and the encryption process does the rest, flipping coins or modifying internal state in order to produce a ciphertext C.
openaire   +1 more source

Electrolyte Design Strategies for Static Shuttle‐Free and Long‐Life Aqueous Zinc‐Iodine Batteries

open access: yesAdvanced Functional Materials, EarlyView.
This review systematically summarizes recent advances in electrolyte design for static aqueous Zn‐I2 batteries, highlighting solvation regulation and interfacial engineering strategies to control reaction kinetics, suppress iodine shuttling, enhance energy density, and stabilize multi‐electron iodine redox chemistry for durable, high‐performance energy
Qianqin Zhou   +3 more
wiley   +1 more source

Hiding Symbols and Functions: New Metrics and Constructions for Information-Theoretic Security [PDF]

open access: yes, 2015
We present information-theoretic definitions and results for analyzing symmetric-key encryption schemes beyond the perfect secrecy regime, i.e. when perfect secrecy is not attained. We adopt two lines of analysis, one based on lossless source coding, and
Calmon, Flavio du Pin   +5 more
core   +1 more source

Atomic Layer Deposition in Transistors and Monolithic 3D Integration

open access: yesAdvanced Functional Materials, EarlyView.
Transistors are fundamental building blocks of modern electronics. This review summarizes recent progress in atomic layer deposition (ALD) for the synthesis of two‐dimensional (2D) metal oxides and transition‐metal dichalcogenides (TMDCs), with particular emphasis on their enabling role in monolithic three‐dimensional (M3D) integration for next ...
Yue Liu   +5 more
wiley   +1 more source

State of The Art and Hot Aspects in Cloud Data Storage Security [PDF]

open access: yes, 2013
Along with the evolution of cloud computing and cloud storage towards matu- rity, researchers have analyzed an increasing range of cloud computing security aspects, data security being an important topic in this area.
Gehrmann, Christian   +2 more
core   +3 more sources

Unlocking Photodetection Mode Switching from a Simple Lateral Design

open access: yesAdvanced Functional Materials, EarlyView.
A simple lateral 2D perovskite photodetector capable of switching among transient, continuous, and dual transient/continuous photoresponse modes is achieved by integrating photoconductive effects with capacitive coupling from the SiO2/Si substrate. Such light‐programmable photodetection mode switching enables triple‐channel information transmission and
Zijun (June) Yong   +10 more
wiley   +1 more source

Measurement of Symmetric Cipher on Low Power Devices for Power Grids [PDF]

open access: yes, 2015
The symmetric ciphers are often used in low power devices for its low requirements. This article provides a measurement of AES-128 cipher, which should be used for secure communication in power grid (smart grid) networks.
Fujdiak, R.
core  

3D‐Printed Hygroscopic Polymer Networks for High‐Humidity Triboelectric Nanogenerators to Wirelessly Power Implantable Electronic Devices‐ A Conceptual Pathway

open access: yesAdvanced Functional Materials, EarlyView.
This work develops 3D‐printable tribopolymer networks that can enhance triboelectric performance under high humidity environments. Polar hydrophilic functional groups and incorporation of zwitterionic monomers promote bound‐water–dominated interfacial polarization thereby increasing electrical outputs.
Linguangze Zhuo   +8 more
wiley   +1 more source

Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency [PDF]

open access: yes, 2017
Recently, several practical attacks raised serious concerns over the security of searchable encryption. The attacks have brought emphasis on forward privacy, which is the key concept behind solutions to the adaptive leakage-exploiting attacks, and will ...
Dong, Changyu   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy