Showing 20 articles starting at article 41
< Previous 20 articles Next 20 articles >
Categories: Computer Science: Encryption, Geoscience: Geomagnetic Storms
Published How secure are voice authentication systems really?



Computer scientists have discovered a method of attack that can successfully bypass voice authentication security systems with up to a 99% success rate after only six tries.
Published New cyber software can verify how much knowledge AI really knows



With a growing interest in generative artificial intelligence (AI) systems worldwide, researchers have created software that is able to verify how much information an AI farmed from an organization's digital database.
Published New breakthrough enables perfectly secure digital communications


Researchers have achieved a breakthrough to enable 'perfectly secure' hidden communications for the first time. The method uses new advances in information theory methods to conceal one piece of content inside another in a way that cannot be detected. This may have strong implications for information security, besides further applications in data compression and storage.
Published Chromo-encryption method encodes secrets with color


In a new approach to security that unites technology and art, E researchers have combined silver nanostructures with polarized light to yield a range of brilliant colors, which can be used to encode messages.
Published Quantum physicists make major nanoscopic advance



In a new breakthrough, researchers have solved a problem that has caused quantum researchers headaches for years. The researchers can now control two quantum light sources rather than one. Trivial as it may seem to those uninitiated in quantum, this colossal breakthrough allows researchers to create a phenomenon known as quantum mechanical entanglement. This in turn, opens new doors for companies and others to exploit the technology commercially.
Published When migrating birds go astray, disturbances in magnetic field may be partly to blame


Disturbances to Earth's magnetic field can lead birds astray -- a phenomenon scientists call 'vagrancy' -- even in perfect weather, and especially during fall migration. While other factors such as weather likely play bigger roles in causing vagrancy, researchers found a strong correlation between birds that were captured far outside of their expected range and the geomagnetic disturbances that occurred during both fall and spring migrations.
Published New study models the transmission of foreshock waves towards Earth


As the supersonic solar wind surges towards Earth, its interaction with our planet's magnetic field creates a shock to deflect its flow, and a foreshock filled with electromagnetic waves. How these waves can propagate to the other side of the shock has long remained a mystery.
Published Researchers propose methods for automatic detection of doxing


A new automated approach to detect doxing -- a form of cyberbullying in which certain private or personally identifiable information is publicly shared without an individual's consent or knowledge -- may help social media platforms better protect their users, according to researchers.
Published Microlaser chip adds new dimensions to quantum communication


With only two levels of superposition, the qubits used in today's quantum communication technologies have limited storage space and low tolerance for interference. Engineering's hyperdimensional microlaser generates 'qudits,' photons with four simultaneous levels of information. The increase in dimension makes for robust quantum communication technology better suited for real-world applications.
Published New AI model can help prevent damaging and costly data breaches


Privacy experts have created an AI algorithm that automatically tests privacy-preserving systems for potential data leaks.
Published Ultrathin solar cells promise improved satellite performance


As low Earth orbit becomes more cluttered, it becomes increasingly necessary to use middle Earth orbits, and radiation-tolerant cell designs will be needed. Making photovoltaics thinner should increase their longevity because the charge carriers have less far to go during their shortened lifetimes. Scientists propose a radiation-tolerant photovoltaic cell design that features an ultrathin layer of light-absorbing material. Compared to thicker cells, nearly 3.5 times less cover glass is needed for the ultra-thin cells to deliver the same amount of power after 20 years of operation.
Published Where do high-energy particles that endanger satellites, astronauts and airplanes come from?


Astrophysicists show how and when specific particles form and offers clues to questions that have troubled scientists since the 1940s.
Published New method to systematically find optimal quantum operation sequences for quantum computers developed


Computer scientists have succeeded in developing a method for systematically finding the optimal quantum operation sequence for a quantum computer. They have developed a systematic method that applies optimal control theory (GRAPE algorithm) to identify the theoretically optimal sequence from among all conceivable quantum operation sequences. This method is expected to become a useful tool for medium-scale quantum computers and is expected to contribute to improving the performance of quantum computers and reducing environmental impact in the near future.
Published From bits to p-bits: One step closer to probabilistic computing


Scientists have developed a mathematical description of what happens within tiny magnets as they fluctuate between states when an electric current and magnetic field are applied. Their findings could act as the foundation for engineering more advanced computers that can quantify uncertainty while interpreting complex data.
Published Thinking like a cyber-attacker to protect user data


Researchers have shown that a component of modern computer processors that enables different areas of the chip to communicate with each other is susceptible to a side-channel attack. An attacker can monitor how traffic from two different cores on a processor interferes with each other to extract secret information, like a cryptographic key.
Published A key role for quantum entanglement


A method known as quantum key distribution has long held the promise of communication security unattainable in conventional cryptography. An international team of scientists has now demonstrated experimentally, for the first time, an approach to quantum key distribution that is based on high-quality quantum entanglement -- offering much broader security guarantees than previous schemes.
Published Quantum cryptography: Hacking is futile


An international team has successfully implemented an advanced form of quantum cryptography for the first time. Moreover, encryption is independent of the quantum device used and therefore even more secure against hacking attempts.
Published 'Pulling back the curtain' to reveal a molecular key to The Wizard of Oz


Many people and companies worry about sensitive data getting hacked, so encrypting files with digital keys has become more commonplace. Now, researchers have developed a durable molecular encryption key from sequence-defined polymers that are built and deconstructed in a sequential way. They hid their molecular key in the ink of a letter, which was mailed and then used to decrypt a file with text from a classic story.
Published Radio waves for the detection of hardware tampering


Up to now, protecting hardware against manipulation has been a laborious business: expensive, and only possible on a small scale. And yet, two simple antennas might do the trick.
Published Secure communication with light particles


While quantum computers offer many novel possibilities, they also pose a threat to internet security since these supercomputers make common encryption methods vulnerable. Based on the so-called quantum key distribution, researchers have developed a new, tap-proof communication network.