Showing 20 articles starting at article 121

< Previous 20 articles        Next 20 articles >

Categories: Computer Science: Encryption, Geoscience: Volcanoes

Return to the site home page

Geoscience: Volcanoes
Published

The oxidation of volcanoes -- a magma opus      (via sciencedaily.com) 

A new study unlocks the science behind a key ingredient -- namely oxygen -- in some of the world's most violent volcanoes. The research offers a new model for understanding the oxidation state of arc magmas, the lavas that form some volcanoes, such as the one that erupted dramatically in Tonga earlier this year. The plume from Tonga's underwater volcanic eruption on Jan. 15 rose 36 miles into the air. Ash from the volcano reached the mesosphere, Earth's third layer of atmosphere.

Geoscience: Volcanoes
Published

Water determines magma depth, a key to accurate models of volcanic activity, eruption      (via sciencedaily.com) 

Around the world, between 40 and 50 volcanoes are currently erupting or in states of unrest, and hundreds of millions of people are at risk of hazards posed by these potentially active volcanos. Yet, despite the profound hazards posed to human life and property by volcanic eruptions, humanity still cannot reliably and accurately predict them, and even when forecasts are accurately made by experts, they may not afford ample time for people to evacuate and make emergency preparations.

Geoscience: Volcanoes
Published

Nealtican lava flow field, Popocatépetl volcano: A window to the past and future hazards      (via sciencedaily.com) 

The Popocatépetl volcano, located southeast of Mexico City, stands as the second highest peak in Mexico and is considered to be one of the potentially most dangerous volcanoes in the world, given its record of highly explosive eruptions over the last 23,000 years.

Computer Science: Encryption
Published

Double locked: Polymer hydrogels secure confidential information      (via sciencedaily.com) 

The development of highly secure but simple and inexpensive encryption technology for the prevention of data leaks and forgeries is decidedly challenging. A research team has now introduced a 'double lock' based on thermoresponsive polymer hydrogels that encrypts information so that it can only be read at a specific window in temperature and time.

Computer Science: Encryption
Published

A security technique to fool would-be cyber attackers      (via sciencedaily.com) 

Researchers developed a technique that effectively protects computer programs' secret information from memory-timing side channel attacks, while enabling faster computation than other security schemes.

Geoscience: Volcanoes
Published

Hidden weaknesses within volcanoes may cause volcano collapse      (via sciencedaily.com) 

Lava domes form at the top of many volcanoes when viscous lava erupts. When they become unstable, they can collapse and cause a hazard. An international team of researchers has analyzed summit dome instabilities at Merapi Volcano, Indonesia. The researchers hope that by understanding the inner processes, volcano collapses can be better forecasted.

Geoscience: Volcanoes
Published

Pink pumice key to revealing explosive power of underwater volcanic eruptions      (via sciencedaily.com) 

The presence of pink pumice in the giant pumice raft of the 2012 Havre that drifted across the southwest Pacific Ocean has led researchers to recognize the immense power of underwater volcanic eruptions.

Computer Science: Encryption Mathematics: Puzzles
Published

The power of chaos: A robust and low-cost cryptosystem for the post-quantum era      (via sciencedaily.com) 

Scientists develop a chaos-based stream cipher that can withstand attacks from large-scale quantum computers.

Computer Science: Encryption
Published

How big does your quantum computer need to be?      (via sciencedaily.com) 

Researchers decided to explore two very different quantum problems: breaking the encryption of Bitcoin and simulating the molecule responsible for biological nitrogen fixation. They describe a tool they created to determine how big a quantum computer needs to be to solve problems like these and how long it will take.

Geoscience: Volcanoes
Published

Is Vesuvius taking an extended siesta?      (via sciencedaily.com) 

Located near Naples, Italy, Vesuvius last had a violent eruption in 1944, towards the end of the Second World War. It could be a few hundred years before another dangerous, explosive eruption occurs, suggests a new study by volcano experts.

Geoscience: Volcanoes
Published

Mount Etna’s exceptional CO2 emissions are triggered by deep carbon dioxide reservoirs      (via sciencedaily.com) 

Magma transports carbon dioxide stored in the Earth's mantle to volcanoes, where it is released into the atmosphere. A research team now presents results obtained using a new methodology to clarify the contribution of volcanoes to natural CO2 emissions.

Geoscience: Volcanoes
Published

2020 volcanic eruption leads to hours-long thunderstorm      (via sciencedaily.com) 

A study discusses how advances in global lightning detection have provided novel ways to characterize explosive volcanism.

Geoscience: Landslides Geoscience: Volcanoes
Published

Powerful volcanic blast not the cause for 2018 Indonesian island collapse      (via sciencedaily.com) 

The dramatic collapse of Indonesia's Anak Krakatau volcano in December 2018 resulted from long-term destabilising processes, and was not triggered by any distinct changes in the magmatic system that could have been detected by current monitoring techniques, new research has found.

Computer Science: Encryption
Published

IT security: Computer attacks with laser light      (via sciencedaily.com) 

Computer systems that are physically isolated from the outside world (air-gapped) can still be attacked. This is demonstrated by IT security experts. They show that data can be transmitted to light-emitting diodes of regular office devices using a directed laser. With this, attackers can secretly communicate with air-gapped computer systems over distances of several meters. In addition to conventional information and communication technology security, critical IT systems need to be protected optically as well.

Computer Science: Encryption Engineering: Biometric
Published

Real-world study shows the potential of gait authentication to enhance smartphone security      (via sciencedaily.com) 

A study showed that -- within an appropriate framework -- gait recognition could be a viable technique for protecting individuals and their data from potential crime.

Computer Science: Encryption
Published

New chip hides wireless messages in plain sight      (via sciencedaily.com) 

Researchers have developed a method for incorporating security in the physical nature of the wireless transmission signal for 5G and future networks.

Geoscience: Volcanoes
Published

'Volcanic winter' likely contributed to ecological catastrophe 250 million years ago      (via sciencedaily.com) 

A team of scientists has identified an additional force that likely contributed to a mass extinction event 250 million years ago. Its analysis of minerals in southern China indicate that volcano eruptions produced a 'volcanic winter' that drastically lowered earth's temperatures -- a change that added to the environmental effects resulting from other phenomena at the time.

Computer Science: Encryption
Published

A nanoantenna for long-distance, ultra-secure communication      (via sciencedaily.com) 

Researchers have used a nanoantenna to focus light onto a single semiconductor nanobox. This approach will enhance the utility of quantum repeater technology currently under development for advanced communication and data storage. Such technology is essential to overcoming the limitations of classical computer information for securely sharing information over long distances.

Computer Science: Encryption
Published

Big data privacy for machine learning just got 100 times cheaper      (via sciencedaily.com) 

Computer scientists have discovered an inexpensive way for tech companies to implement a rigorous form of personal data privacy when using or sharing large databases for machine learning.

Computer Science: Encryption Engineering: Biometric
Published

Securing data transfers with relativity      (via sciencedaily.com) 

To counter hacking, researchers have developed a new system based on the concept of 'zero-knowledge proofs', the security of which is based on the physical principle of relativity: information cannot travel faster than the speed of light. Thus, one of the fundamental principles of modern physics allows for secure data transfer.