Search query: encryption
Categories: All Categories
13142 records searched, 107 records found, 20 matches displayed
< Previous 20 articles Next 20 articles >
Search Hints:
- Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
- Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
- Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
- Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)
Most frequent words for articles published in the last 45 days:
developed (95),
climate (85),
team (83),
species (75),
cells (74),
used (72),
human (64),
help (61),
change (60),
water (60),
years (60),
data (57),
energy (55),
such (53),
carbon (51),
discovered (50),
time (48),
like (47),
materials (46),
even (44)
Published Accelerating AI tasks while preserving data security (via sciencedaily.com) Original source
SecureLoop is a new search engine that can identify an optimal design for a deep neural network acce...
Published Protecting art and passwords with biochemistry (via sciencedaily.com) Original source
A new molecular test method helps to prove the authenticity of works of art. The new method could al...
Published Breakthrough promises secure quantum computing at home (via sciencedaily.com) Original source
The full power of next-generation quantum computing could soon be harnessed by millions of individua...
Published Clear guidelines needed for synthetic data to ensure transparency, accountability and fairness, study says (via sciencedaily.com) Original source
Clear guidelines should be established for the generation and processing of synthetic data to ensure...
Published This tiny chip can safeguard user data while enabling efficient computing on a smartphone (via sciencedaily.com) Original source
A new chip can efficiently accelerate machine-learning workloads on edge devices like smartphones wh...
Published Mechanical computer relies on kirigami cubes, not electronics (via sciencedaily.com) Original source
Researchers have developed a kirigami-inspired mechanical computer that uses a complex structure of...
Published Mass layoffs and data breaches could be connected (via sciencedaily.com) Original source
A research team has been exploring how mass layoffs and data breaches could be connected. Their theo...
Published Where quantum computers can score (via sciencedaily.com) Original source
The traveling salesman problem is considered a prime example of a combinatorial optimization problem...
Published Toward a code-breaking quantum computer (via sciencedaily.com) Original source
Building on a landmark algorithm, researchers propose a way to make a smaller and more noise-toleran...
Published Optical fibers fit for the age of quantum computing (via sciencedaily.com) Original source
A new generation of specialty optical fibers has been developed by physicists to cope with the chall...
Published Physicists develop new method to combine conventional internet with the quantum internet (via sciencedaily.com) Original source
Researchers send entangled photons and laser pulses of the same color over a single optical fiber fo...
Published Is your mobile provider tracking your location? New technology could stop it - Is Your Mobile Provider Tracking Your Location? New Technology Could Stop It (via sciencedaily.com)
Right now, there is a good chance your phone is tracking your location -- even with GPS services tur...
Published Quantum cryptography: Hacking is futile - Quantum Cryptography: Hacking is Futile (via sciencedaily.com)
An international team has successfully implemented an advanced form of quantum cryptography for the...
Published Securing supply chains with quantum computing - Securing Supply Chains with Quantum Computing (via sciencedaily.com)
New research in quantum computing is moving science closer to being able to overcome supply-chain ch...
Published Secure communication with light particles - Secure Communication with Light Particles: A Breakthrough in Quantum Cryptography (via sciencedaily.com)
While quantum computers offer many novel possibilities, they also pose a threat to internet security...
Published The power of chaos: A robust and low-cost cryptosystem for the post-quantum era - The Power of Chaos: A Robust and Low-Cost Cryptosystem for the Post-Quantum Era (via sciencedaily.com)
Scientists develop a chaos-based stream cipher that can withstand attacks from large-scale quantum c...
Published A new design for quantum computers (via sciencedaily.com) Original source
Creating a quantum computer powerful enough to tackle problems we cannot solve with current computer...
Published Keep it secret: Cloud data storage security approach taps quantum physics (via sciencedaily.com) Original source
Distributed cloud storage is a hot topic for security researchers, and a team is now merging quantum...
Published VR may pose privacy risks for kids: A new study finds parents aren't as worried as they should be (via sciencedaily.com) Original source
New research finds that, while an increasing number of minors are using virtual reality (VR) apps, n...
Published An uncrackable combination of invisible ink and artificial intelligence - An Uncrackable Combination of Invisible Ink and Artificial Intelligence (via sciencedaily.com)
Coded messages in invisible ink sound like something only found in espionage books, but in real life...