Results 61 to 70 of about 124,809 (301)
A Sustainable Approach to Delivering Programmable Peer-to-Peer Offline Payments
Payment apps and digital wallets are powerful tools used to exchange e-money via the internet. However, with the progressive disappearance of cash, there is a need for the digital equivalent of physical banknotes to guarantee the same level of anonymity ...
Luca Mainetti +3 more
doaj +1 more source
A Review on Sensor Technologies, Control Approaches, and Emerging Challenges in Soft Robotics
This review provides an introspective of sensors and controllers in soft robotics. Initially describing the current sensing methods, then moving on to the control methods utilized, and finally ending with challenges and future directions in soft robotics focusing on the material innovations, sensor fusion, and embedded intelligence for sensors and ...
Ean Lovett +5 more
wiley +1 more source
TacScope: A Miniaturized Vision‐Based Tactile Sensor for Surgical Applications
TacScope is a compact, vision‐based tactile sensor designed for robot‐assisted surgery. By leveraging a curved elastomer surface with pressure‐sensitive particle redistribution, it captures high‐resolution 3D tactile feedback. TacScope enables accurate tumor detection and shape classification beneath soft tissue phantoms, offering a scalable, low‐cost ...
Md Rakibul Islam Prince +3 more
wiley +1 more source
Faulty Point Unit: ABI Poisoning Attacks on Trusted Execution Environments [PDF]
Fritz Alder +4 more
openalex +1 more source
Nanosafety data provide a guiding example for establishing best practices in data management, aligning with FAIR principles and quality criteria. This review explores existing quality assessment approaches for reliability, relevance, and completeness, emphasizing the need for harmonization and adaptation to nanomaterials and advanced materials. The aim
Verónica I. Dumit +43 more
wiley +1 more source
SPEKS: Forward Private SGX-Based Public Key Encryption with Keyword Search
Public key encryption with keyword search (PEKS) enables users to search over encrypted data outsourced to an untrusted server. Unfortunately, updates to the outsourced data may incur information leakage by exploiting the previously submitted queries ...
Hyundo Yoon +5 more
doaj +1 more source
Towards trusted volunteer grid environments
Intensive experiences show and confirm that grid environments can be considered as the most promising way to solve several kinds of problems relating either to cooperative work especially where involved collaborators are dispersed geographically or to ...
Belghith, Abdelfettah, Khemakhem, Maher
core +1 more source
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li +7 more
wiley +1 more source
TrustChain: a privacy protection smart contract model with trusted execution environment
With the booming development of blockchain, it has gradually gained wide attention in the Internet of Things (IoT), finance, and other fields. However, due to the shared nature of blockchain ledgers among multiple users, sensitive user information, such ...
Fengyu Wu +5 more
doaj +1 more source
RAPTEE: Leveraging trusted execution environments for Byzantine-tolerant peer sampling services [PDF]
Matthieu Pigaglio +5 more
openalex +1 more source

