Showing 20 articles starting at article 201
< Previous 20 articles Next 20 articles >
Categories: Computer Science: Encryption, Geoscience: Earthquakes
Published IT security: Computer attacks with laser light


Computer systems that are physically isolated from the outside world (air-gapped) can still be attacked. This is demonstrated by IT security experts. They show that data can be transmitted to light-emitting diodes of regular office devices using a directed laser. With this, attackers can secretly communicate with air-gapped computer systems over distances of several meters. In addition to conventional information and communication technology security, critical IT systems need to be protected optically as well.
Published Real-world study shows the potential of gait authentication to enhance smartphone security


A study showed that -- within an appropriate framework -- gait recognition could be a viable technique for protecting individuals and their data from potential crime.
Published New chip hides wireless messages in plain sight


Researchers have developed a method for incorporating security in the physical nature of the wireless transmission signal for 5G and future networks.
Published A nanoantenna for long-distance, ultra-secure communication


Researchers have used a nanoantenna to focus light onto a single semiconductor nanobox. This approach will enhance the utility of quantum repeater technology currently under development for advanced communication and data storage. Such technology is essential to overcoming the limitations of classical computer information for securely sharing information over long distances.
Published Big data privacy for machine learning just got 100 times cheaper


Computer scientists have discovered an inexpensive way for tech companies to implement a rigorous form of personal data privacy when using or sharing large databases for machine learning.
Published Securing data transfers with relativity


To counter hacking, researchers have developed a new system based on the concept of 'zero-knowledge proofs', the security of which is based on the physical principle of relativity: information cannot travel faster than the speed of light. Thus, one of the fundamental principles of modern physics allows for secure data transfer.
Published Physicists describe photons’ characteristics to protect future quantum computing


Physicists have described in theoretical terms how to develop codes that cannot be broken by quantum computers -- computing devices of the future. These codes rely on distributing single photons that share a quantum character solely among the parties that wish to communicate.
Published Using quantum Parrondo’s random walks for encryption


SUTD has set out to apply concepts from quantum Parrondo's paradox in search of a working protocol for semiclassical encryption.
Published Quantum networks in our future


Investigators outline how a time-sensitive network control plane could be a key component of a workable quantum network. In addition to the well-understood requirements of transmission distance and data rate, for quantum networks to be useful in a real-world setting there are at least two other requirements that need to be considered. One is real-time network control, specifically time-sensitive networking. The second is cost.
Published One material with two functions could lead to faster memory


Researchers have developed a new light-emitting memory device by integrating a resistive random-access memory with a light-emitting electrochemical cell that are both based on perovskite. The results are promising for faster data storage and reading in future electronic devices and open a new avenue of applications for perovskite optoelectronics.
Published Is your mobile provider tracking your location? New technology could stop it


Right now, there is a good chance your phone is tracking your location -- even with GPS services turned off. That's because, to receive service, our phones reveal personal identifiers to cell towers owned by major network operators. This has led to vast and largely unregulated data-harvesting industries based around selling users' location data to third parties without consent. For the first time, researchers have found a way to stop this privacy breach using existing cellular networks. The new system protects users' mobile privacy while providing normal mobile connectivity.
Published Impenetrable optical OTP security platform


An anticounterfeiting smart label and security platform which makes forgery fundamentally impossible has been proposed. The device accomplishes this by controlling a variety of information of light including the color, phase, and polarization in one optical device.
Published Compact quantum computer for server centers


Quantum computers have been one-of-a-kind devices that fill entire laboratories. Now, physicists have built a prototype of an ion trap quantum computer that can be used in industry. It fits into two 19-inch server racks like those found in data centers throughout the world. The compact, self-sustained device demonstrates how this technology will soon be more accessible.
Published New twist on DNA data storage lets users preview stored files


Researchers have turned a longstanding challenge in DNA data storage into a tool, using it to offer users previews of stored data files -- such as thumbnail versions of image files.
Published 'PrivacyMic': For a smart speaker that doesn't eavesdrop


Microphones are perhaps the most common electronic sensor in the world, with an estimated 320 million listening for our commands in the world's smart speakers. The trouble is that they're capable of hearing everything else, too.
Published Graphene key for novel hardware security


As more private data is stored and shared digitally, researchers are exploring new ways to protect data against attacks from bad actors. Current silicon technology exploits microscopic differences between computing components to create secure keys, but artificial intelligence (AI) techniques can be used to predict these keys and gain access to data. Now, researchers have designed a way to make the encrypted keys harder to crack.
Published An uncrackable combination of invisible ink and artificial intelligence


Coded messages in invisible ink sound like something only found in espionage books, but in real life, they can have important security purposes. Yet, they can be cracked if their encryption is predictable. Now, researchers have printed complexly encoded data with normal ink and a carbon nanoparticle-based invisible ink, requiring both UV light and a computer that has been taught the code to reveal the correct messages.
Published Algorithms improve how we protect our data


Scientists have developed algorithms that more efficiently measure how difficult it would be for an attacker to guess secret keys for cryptographic systems. The approach could reduce the computational complexity needed to validate encryption security.
Published Computer scientists discover new vulnerability affecting computers globally


A team o computer science researchers has uncovered a line of attack that breaks all Spectre defenses, meaning that billions of computers and other devices across the globe are just as vulnerable today as they were when Spectre was first announced.
Published Materials advances are key to development of quantum hardware


A new article argues that the ability to move forward on developing useful quantum computers requires new major advances in materials science, engineering and fabrication. The authors call for new approaches from broad areas of science and engineering.