Results 71 to 80 of about 150,216 (340)
Trusted computing: Challenges & solutions [PDF]
Most citizens of the world today are fighting for – either by battling viruses, spam, phishing or other malware, or by fending off schemes to compromise privacy and extract confidential information.With these worries in mind, the Trusted Computing Group
Awang, Nor Fatimah
core
SGXIO: Generic Trusted I/O Path for Intel SGX
Application security traditionally strongly relies upon security of the underlying operating system. However, operating systems often fall victim to software attacks, compromising security of applications as well.
Anati I.+6 more
core +1 more source
In this study, the mechanical response of Y‐shaped core sandwich beams under compressive loading is investigated, using deep feed‐forward neural networks (DFNNs) for predictive modeling. The DFNN model accurately captures stress–strain behavior, influenced by design parameters and loading rates.
Ali Khalvandi+4 more
wiley +1 more source
Cycle ORAM: A Practical Protection for Access Pattern in Untrusted Storage
Oblivious RAM (ORAM) is a cryptographic primitive to hide memory access pattern in untrusted storage, but the cost remains prohibitively expensive. This paper proposes cycle ORAM, an improvement of Ring ORAM for small client setting.
Bo Zhao, Zhihong Chen, Hai Lin
doaj +1 more source
A Method of Ultra-Large-Scale Matrix Inversion Using Block Recursion
Ultra-large-scale matrix inversion has been applied as the fundamental operation of numerous domains, owing to the growth of big data and matrix applications.
HouZhen Wang, Yan Guo, HuanGuo Zhang
doaj +1 more source
Bistable Mechanisms 3D Printing for Mechanically Programmable Vibration Control
This work introduces a 3D‐printed bistable mechanism integrated into tuned mass dampers (TMDs) for mechanically adaptive passive vibration suppression. Through optimized geometry, the bistable design provides adaptable vibration reduction across a broad range of scenarios, achieving effective vibration mitigation without complex controls or external ...
Ali Zolfagharian+4 more
wiley +1 more source
Delivery of content to mobile devices gains increasing importance in industrial environments to support employees in the field. An important application are e-mail push services like the fashionable Blackberry.
Kuntze, Nicolai, Schmidt, Andreas U.
core +2 more sources
Beyond Order: Perspectives on Leveraging Machine Learning for Disordered Materials
This article explores how machine learning (ML) revolutionizes the study and design of disordered materials by uncovering hidden patterns, predicting properties, and optimizing multiscale structures. It highlights key advancements, including generative models, graph neural networks, and hybrid ML‐physics methods, addressing challenges like data ...
Hamidreza Yazdani Sarvestani+4 more
wiley +1 more source
A Security Pattern for Cloud service certification [PDF]
Cloud computing is interesting from the economic, operational and even energy consumption perspectives but it still raises concerns regarding the security, privacy, governance and compliance of the data and software services offered through it. However,
López, Javier+1 more
core
Citizen Electronic Identities using TPM 2.0
Electronic Identification (eID) is becoming commonplace in several European countries. eID is typically used to authenticate to government e-services, but is also used for other services, such as public transit, e-banking, and physical security access ...
Asokan, N.+2 more
core +1 more source