Results 121 to 130 of about 928,376 (284)
Planar Solid‐State Nanopores Toward Scalable Nanofluidic Integration Based on CMOS Technology
We present a scalable silicon‐based fabrication strategy for planar solid‐state nanopores to enable their integration with complex nanofluidic systems. Prototype devices demonstrate normal voltage‐current characteristics, good noise performance, and appreciable streaming currents. Our CMOS‐compatible fabrication process offers precise geometric control
Ngan Hoang Pham +7 more
wiley +1 more source
Key Distribution for Symmetric Key Cryptography: A Review
In today’s digital communication era sharing of information is increasing significantly. The information being transmitted is vulnerable to various passive and active attacks. Therefore, the information security is one of the most challenging aspects of communication.
openaire +1 more source
Secure Composition of Quantum Key Distribution and Symmetric Key Encryption
Quantum key distribution (QKD) allows Alice and Bob to share a secret key over an insecure channel with proven information-theoretic security against an adversary whose strategy is bounded only by the laws of physics. Composability-based security proofs of QKD ensure that using the established key with a one-time-pad encryption scheme provides ...
Kunal Dey, Reihaneh Safavi-Naini
openaire +2 more sources
A Workflow to Accelerate Microstructure‐Sensitive Fatigue Life Predictions
This study introduces a workflow to accelerate predictions of microstructure‐sensitive fatigue life. Results from frameworks with varying levels of simplification are benchmarked against published reference results. The analysis reveals a trade‐off between accuracy and model complexity, offering researchers a practical guide for selecting the optimal ...
Luca Loiodice +2 more
wiley +1 more source
Trace additions of Sn and Sr combined with a two‐step aging treatment are shown to enhance the microstructure and performance of Al–Zr–Sc conductor alloys. Strength and electrical conductivity increase concurrently through accelerated precipitation of fine Al3(Sc, Zr) precipitates and improved dislocation resistance, offering a cost‐effective pathway ...
Quan Shao +3 more
wiley +1 more source
A hierarchical porous copper current collector is fabricated via three‐dimensional printing combined with pressureless sintering to stabilize lithium metal anodes. The interconnected architecture lowers local current density, guides uniform Li deposition within pores, and suppresses dendrite growth.
Alok Kumar Mishra, Mukul Shukla
wiley +1 more source
Research on large-scale identity authentication architecture based on combined symmetric key
A large-scale real-name authentication architecture and key management protocol based on combined symmet-ric key algorithm were proposed.With the CSK algorithm and smart card technology, the authentication process can be finished in the chips, and the ...
LIU Tong, XU Guan-ning
doaj +2 more sources
Securing Automatic Identification System Communications Using Physical-Layer Key Generation Protocol
The automatic identification system (AIS) is an essential tool for modern ships, enabling the broadcast of identification and location information. However, the current AIS standard lacks security features, meaning that messages exchanged via AISs are ...
Jingyu Sun +3 more
doaj +1 more source
Thermomechanical fatigue tests of laser beam powder bed fusion (PBF‐LB) Inconel 718 show that the additively manufactured material reaches almost the lifetimes of conventionally‐rolled material under no‐dwell conditions. Introducing dwell times at the maximum temperature markedly reduces the lifetimes due to pronounced grain boundary sliding associated
Stefan Guth +6 more
wiley +1 more source
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography [PDF]
Despite many good (secure) key agreement protocols based on public-key cryptography exist, secure associations between two wireless devices are often established using symmetric-key cryptography for cost reasons. The consequence is that common daily used security protocols such as Bluetooth pairing are insecure in the sense that an adversary can easily
openaire +1 more source

