Showing 20 articles starting at article 41

< Previous 20 articles        Next 20 articles >

Categories: Computer Science: Encryption

Return to the site home page

Computer Science: Encryption Engineering: Biometric
Published

Radio waves for the detection of hardware tampering      (via sciencedaily.com) 

Up to now, protecting hardware against manipulation has been a laborious business: expensive, and only possible on a small scale. And yet, two simple antennas might do the trick.

Computer Science: Encryption
Published

Secure communication with light particles      (via sciencedaily.com) 

While quantum computers offer many novel possibilities, they also pose a threat to internet security since these supercomputers make common encryption methods vulnerable. Based on the so-called quantum key distribution, researchers have developed a new, tap-proof communication network.

Computer Science: Encryption
Published

Emulating impossible 'unipolar' laser pulses paves the way for processing quantum information      (via sciencedaily.com) 

A laser pulse that sidesteps the inherent symmetry of light waves could manipulate quantum information, potentially bringing us closer to room temperature quantum computing.

Computer Science: Encryption
Published

Self-propelled, endlessly programmable artificial cilia      (via sciencedaily.com) 

Researchers have developed a single-material, single-stimuli microstructure that can outmaneuver even living cilia. These programmable, micron-scale structures could be used for a range of applications, including soft robotics, biocompatible medical devices, and even dynamic information encryption.

Computer Science: Encryption Mathematics: Puzzles
Published

Scientific advance leads to a new tool in the fight against hackers      (via sciencedaily.com) 

A new form of security identification could soon see the light of day and help us protect our data from hackers and cybercriminals. Quantum mathematicians have solved a mathematical riddle that allows for a person's geographical location to be used as a personal ID that is secure against even the most advanced cyber attacks.

Computer Science: Encryption
Published

New technique offers faster security for non-volatile memory tech      (via sciencedaily.com) 

Researchers have developed a technique that leverages hardware and software to improve file system security for next-generation memory technologies called non-volatile memories (NVMs). The new encryption technique also permits faster performance than existing software security technologies.

Computer Science: Encryption
Published

Technology has the potential to change the patient-provider relationship      (via sciencedaily.com) 

As personal health records (AKA patient portals) allowing patients to see test results, medications and other health information gain in popularity, scientists studied cancer patients' and doctors' differing perceptions of this tool. Patients cited potential for personal health records to deepen their relationship with their healthcare provider and to allow them to be more understood. Physicians were interested in having more clinical information sharing to facilitate better patient care.

Computer Science: Encryption Mathematics: Puzzles
Published

Single-photon source paves the way for practical quantum encryption      (via sciencedaily.com) 

Researchers describe new high-purity single-photon source that can operate at room temperature. The source is an important step toward practical applications of quantum technology, such as highly secure communication based on quantum key distribution (QKD).

Computer Science: Encryption
Published

Tiny, cheap solution for quantum-secure encryption      (via sciencedaily.com) 

Engineers propose a new kind of encryption to protect data in the age of quantum computers.

Computer Science: Encryption
Published

Qubits: Developing long-distance quantum telecommunications networks      (via sciencedaily.com) 

Computers, smartphones, GPS: quantum physics has enabled many technological advances. It is now opening up new fields of research in cryptography (the art of coding messages) with the aim of developing ultra-secure telecommunications networks. There is one obstacle, however: after a few hundred kilometers within an optical fiber, the photons that carry the qubits or 'quantum bits' (the information) disappear. They therefore need 'repeaters', a kind of 'relay', which are partly based on a quantum memory. By managing to store a qubit in a crystal (a 'memory') for 20 milliseconds, a team has now taken a major step towards the development of long-distance quantum telecommunications networks.

Computer Science: Encryption
Published

Tiny magnets could hold the secret to new quantum computers      (via sciencedaily.com) 

Scientists have discovered a type of magnetic behavior that could help enable magnetically based quantum devices.

Computer Science: Encryption
Published

Double locked: Polymer hydrogels secure confidential information      (via sciencedaily.com) 

The development of highly secure but simple and inexpensive encryption technology for the prevention of data leaks and forgeries is decidedly challenging. A research team has now introduced a 'double lock' based on thermoresponsive polymer hydrogels that encrypts information so that it can only be read at a specific window in temperature and time.

Computer Science: Encryption
Published

A security technique to fool would-be cyber attackers      (via sciencedaily.com) 

Researchers developed a technique that effectively protects computer programs' secret information from memory-timing side channel attacks, while enabling faster computation than other security schemes.

Computer Science: Encryption Mathematics: Puzzles
Published

The power of chaos: A robust and low-cost cryptosystem for the post-quantum era      (via sciencedaily.com) 

Scientists develop a chaos-based stream cipher that can withstand attacks from large-scale quantum computers.

Computer Science: Encryption
Published

How big does your quantum computer need to be?      (via sciencedaily.com) 

Researchers decided to explore two very different quantum problems: breaking the encryption of Bitcoin and simulating the molecule responsible for biological nitrogen fixation. They describe a tool they created to determine how big a quantum computer needs to be to solve problems like these and how long it will take.

Computer Science: Encryption
Published

IT security: Computer attacks with laser light      (via sciencedaily.com) 

Computer systems that are physically isolated from the outside world (air-gapped) can still be attacked. This is demonstrated by IT security experts. They show that data can be transmitted to light-emitting diodes of regular office devices using a directed laser. With this, attackers can secretly communicate with air-gapped computer systems over distances of several meters. In addition to conventional information and communication technology security, critical IT systems need to be protected optically as well.

Computer Science: Encryption Engineering: Biometric
Published

Real-world study shows the potential of gait authentication to enhance smartphone security      (via sciencedaily.com) 

A study showed that -- within an appropriate framework -- gait recognition could be a viable technique for protecting individuals and their data from potential crime.

Computer Science: Encryption
Published

New chip hides wireless messages in plain sight      (via sciencedaily.com) 

Researchers have developed a method for incorporating security in the physical nature of the wireless transmission signal for 5G and future networks.

Computer Science: Encryption
Published

A nanoantenna for long-distance, ultra-secure communication      (via sciencedaily.com) 

Researchers have used a nanoantenna to focus light onto a single semiconductor nanobox. This approach will enhance the utility of quantum repeater technology currently under development for advanced communication and data storage. Such technology is essential to overcoming the limitations of classical computer information for securely sharing information over long distances.

Computer Science: Encryption
Published

Big data privacy for machine learning just got 100 times cheaper      (via sciencedaily.com) 

Computer scientists have discovered an inexpensive way for tech companies to implement a rigorous form of personal data privacy when using or sharing large databases for machine learning.