Showing 20 articles starting at article 61
< Previous 20 articles Next 20 articles >
Categories: Computer Science: Encryption, Geoscience: Geomagnetic Storms
Published Emulating impossible 'unipolar' laser pulses paves the way for processing quantum information


A laser pulse that sidesteps the inherent symmetry of light waves could manipulate quantum information, potentially bringing us closer to room temperature quantum computing.
Published Major infrared breakthrough could lead to solar power at night


Using technology similar to night-vision goggles, researchers have developed a device that can generate electricity from thermal radiation.
Published Self-propelled, endlessly programmable artificial cilia


Researchers have developed a single-material, single-stimuli microstructure that can outmaneuver even living cilia. These programmable, micron-scale structures could be used for a range of applications, including soft robotics, biocompatible medical devices, and even dynamic information encryption.
Published Scientific advance leads to a new tool in the fight against hackers


A new form of security identification could soon see the light of day and help us protect our data from hackers and cybercriminals. Quantum mathematicians have solved a mathematical riddle that allows for a person's geographical location to be used as a personal ID that is secure against even the most advanced cyber attacks.
Published Modeling Earth's magnetosphere in the laboratory


Scientists report a method to study smaller magnetospheres, sometimes just millimeters thick, in the laboratory. The new experimental platform combines the magnetic field of the Large Plasma Device with a fast laser-driven plasma and a current-driven dipole magnet. The LAPD magnetic field provides a model of the solar system's interplanetary magnetic field, while the laser-driven plasma models the solar wind and the dipole magnet provides a model for the Earth's inherent magnetic field. Motorized probes allow system scans in three dimensions by combining data from tens of thousands of laser shots.
Published New technique offers faster security for non-volatile memory tech


Researchers have developed a technique that leverages hardware and software to improve file system security for next-generation memory technologies called non-volatile memories (NVMs). The new encryption technique also permits faster performance than existing software security technologies.
Published Technology has the potential to change the patient-provider relationship


As personal health records (AKA patient portals) allowing patients to see test results, medications and other health information gain in popularity, scientists studied cancer patients' and doctors' differing perceptions of this tool. Patients cited potential for personal health records to deepen their relationship with their healthcare provider and to allow them to be more understood. Physicians were interested in having more clinical information sharing to facilitate better patient care.
Published Researchers discover source of super-fast electron 'rain'


Scientists have discovered a new source of super-fast, energetic electrons raining down on Earth's atmosphere, a phenomenon that contributes to the colorful aurora borealis and poses hazards to satellites, spacecraft and astronauts.
Published Single-photon source paves the way for practical quantum encryption


Researchers describe new high-purity single-photon source that can operate at room temperature. The source is an important step toward practical applications of quantum technology, such as highly secure communication based on quantum key distribution (QKD).
Published Tiny, cheap solution for quantum-secure encryption


Engineers propose a new kind of encryption to protect data in the age of quantum computers.
Published Qubits: Developing long-distance quantum telecommunications networks


Computers, smartphones, GPS: quantum physics has enabled many technological advances. It is now opening up new fields of research in cryptography (the art of coding messages) with the aim of developing ultra-secure telecommunications networks. There is one obstacle, however: after a few hundred kilometers within an optical fiber, the photons that carry the qubits or 'quantum bits' (the information) disappear. They therefore need 'repeaters', a kind of 'relay', which are partly based on a quantum memory. By managing to store a qubit in a crystal (a 'memory') for 20 milliseconds, a team has now taken a major step towards the development of long-distance quantum telecommunications networks.
Published Tiny magnets could hold the secret to new quantum computers


Scientists have discovered a type of magnetic behavior that could help enable magnetically based quantum devices.
Published Double locked: Polymer hydrogels secure confidential information


The development of highly secure but simple and inexpensive encryption technology for the prevention of data leaks and forgeries is decidedly challenging. A research team has now introduced a 'double lock' based on thermoresponsive polymer hydrogels that encrypts information so that it can only be read at a specific window in temperature and time.
Published A security technique to fool would-be cyber attackers


Researchers developed a technique that effectively protects computer programs' secret information from memory-timing side channel attacks, while enabling faster computation than other security schemes.
Published The power of chaos: A robust and low-cost cryptosystem for the post-quantum era


Scientists develop a chaos-based stream cipher that can withstand attacks from large-scale quantum computers.
Published Ancient ice reveals mysterious solar storm


Through analysis of ice cores from Greenland and Antarctica, a research team has found evidence of an extreme solar storm that occurred about 9,200 years ago. What puzzles the researchers is that the storm took place during one of the sun's more quiet phases -- during which it is generally believed our planet is less exposed to such events.
Published How big does your quantum computer need to be?


Researchers decided to explore two very different quantum problems: breaking the encryption of Bitcoin and simulating the molecule responsible for biological nitrogen fixation. They describe a tool they created to determine how big a quantum computer needs to be to solve problems like these and how long it will take.
Published IT security: Computer attacks with laser light


Computer systems that are physically isolated from the outside world (air-gapped) can still be attacked. This is demonstrated by IT security experts. They show that data can be transmitted to light-emitting diodes of regular office devices using a directed laser. With this, attackers can secretly communicate with air-gapped computer systems over distances of several meters. In addition to conventional information and communication technology security, critical IT systems need to be protected optically as well.
Published Real-world study shows the potential of gait authentication to enhance smartphone security


A study showed that -- within an appropriate framework -- gait recognition could be a viable technique for protecting individuals and their data from potential crime.
Published New chip hides wireless messages in plain sight


Researchers have developed a method for incorporating security in the physical nature of the wireless transmission signal for 5G and future networks.