Results 81 to 90 of about 198,702 (277)
A Review on Blockchain for Fintech using Zero Trust Architecture
Financial Technology (FinTech) has sparked widespread interest and is fast spreading. As a result of its continual growth, new terminology in this domain has been introduced. The name 'FinTech' is one such example.
Avinash Singh +2 more
doaj +1 more source
A data plane security model of SR-BE/TE based on zero-trust architecture. [PDF]
Wang L +5 more
europepmc +1 more source
Regiorandom Polythiophenes for Fully Stretchable Electrochemical Transistors and Logic Circuits
Regiorandom (RRa) polythiophenes, once regarded as unsuitable for electronics, exhibit exceptional switching performance via volumetric electrochemical doping. Optimized RRa‐based organic electrochemical transistors (OECTs) achieve a high on/off ratio (≈104), stable operation under 200% strain, and enable fully stretchable logic gates, demonstrating ...
Dong Hyun Park +6 more
wiley +1 more source
The field programmable gate array (FPGA) supply chain is vulnerable to security issues from untrusted participants involved, resulting in the significant research being conducted in this domain.
Akshay Kulkarni +2 more
doaj +1 more source
A Security Awareness and Protection System for 5G Smart Healthcare Based on Zero-Trust Architecture. [PDF]
Chen B +8 more
europepmc +1 more source
Liquid‐phase transmission electron microscopy enables direct observation of nucleation and growth processes in solution. This review is dedicated to the remembrance of Helmut Cölfen and highlights recent studies on complex materials—oxides, biominerals, organic–inorganic crystals—which were central to his research activity. It summarizes key milestones,
Charles Sidhoum +5 more
wiley +1 more source
A Systematic Literature Review of Zero Trust Architecture for Military UAV Security Systems
Over the last couple of years, the application of autonomous systems such as drones has been widely accepted, and these applications are used in the defense, safety, logistics, delivery, and consumer sectors.
Alanoud A. Alquwayzani +1 more
doaj +1 more source
Zero Trust Anonymous Access Scheme Based on Software-defined Perimeters [PDF]
Software-defined perimeters,as a highly scalable and secure zero-trust security architecture,have gained widespread adoption.Conventional software-defined perimeter(SDP) architectures employ a single packet authorization mechanism to achieve resource ...
LI Weixian, ZHANG Jianhui, ZENG Junjie, JIA Hongyong, MEN Ruirui
doaj +1 more source
2D Magnetic and Topological Quantum Materials and Devices for Ultralow Power Spintronics
2D magnets and topological quantum materials enable ultralow‐power spintronics by combining robust magnetic order with symmetry‐protected, Berry‐curvature‐driven transport. Fundamentals of 2D anisotropy and spin‐orbit‐coupling induced band inversion are linked to scalable growth and vdW stacking.
Brahmdutta Dixit +5 more
wiley +1 more source
Research on data transmission anomaly detection based on zero-trust architecture and graph neural networks [PDF]
In response to the data transmission security risks faced by enterprise-level financial and budgeting systems in open and interconnected environments, this paper proposes an anomaly detection framework, ZT-GSAD, which integrates zero-trust architecture ...
Yixuan Chen +4 more
doaj +1 more source

