Search query: encryption

Categories: All Categories


13142 records searched, 107 records found, 20 matches displayed

< Previous 20 articles        Next 20 articles >


Search Hints:

  • Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
  • Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
  • Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
  • Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)


Most frequent words for articles published in the last 45 days:
developed (95), climate (85), team (83), species (75), cells (74), used (72), human (64), help (61), change (60), water (60), years (60), data (57), energy (55), such (53), carbon (51), discovered (50), time (48), like (47), materials (46), even (44)


Return to the site home page

Computer Science: Encryption Computer Science: General
Published

Accelerating AI tasks while preserving data security      (via sciencedaily.com)     Original source 

SecureLoop is a new search engine that can identify an optimal design for a deep neural network acce...

Chemistry: Biochemistry Chemistry: Organic Chemistry Computer Science: Encryption Computer Science: General Physics: General
Published

Protecting art and passwords with biochemistry      (via sciencedaily.com)     Original source 

A new molecular test method helps to prove the authenticity of works of art. The new method could al...

Computer Science: Encryption
Published

Clear guidelines needed for synthetic data to ensure transparency, accountability and fairness, study says      (via sciencedaily.com)     Original source 

Clear guidelines should be established for the generation and processing of synthetic data to ensure...

Computer Science: Encryption Computer Science: General
Published

This tiny chip can safeguard user data while enabling efficient computing on a smartphone      (via sciencedaily.com)     Original source 

A new chip can efficiently accelerate machine-learning workloads on edge devices like smartphones wh...

Computer Science: Encryption Computer Science: General Offbeat: Computers and Math Offbeat: General
Published

Mechanical computer relies on kirigami cubes, not electronics      (via sciencedaily.com)     Original source 

Researchers have developed a kirigami-inspired mechanical computer that uses a complex structure of...

Computer Science: Encryption
Published

Mass layoffs and data breaches could be connected      (via sciencedaily.com)     Original source 

A research team has been exploring how mass layoffs and data breaches could be connected. Their theo...

Computer Science: Encryption Computer Science: General Computer Science: Quantum Computers Mathematics: Puzzles
Published

Where quantum computers can score      (via sciencedaily.com)     Original source 

The traveling salesman problem is considered a prime example of a combinatorial optimization problem...

Computer Science: Encryption
Published

Quantum cryptography: Hacking is futile - Quantum Cryptography: Hacking is Futile      (via sciencedaily.com) 

An international team has successfully implemented an advanced form of quantum cryptography for the...

Computer Science: Encryption
Published

Secure communication with light particles - Secure Communication with Light Particles: A Breakthrough in Quantum Cryptography      (via sciencedaily.com) 

While quantum computers offer many novel possibilities, they also pose a threat to internet security...

Computer Science: Encryption Computer Science: General Computer Science: Quantum Computers
Published

A new design for quantum computers      (via sciencedaily.com)     Original source 

Creating a quantum computer powerful enough to tackle problems we cannot solve with current computer...

Computer Science: Encryption
Published

An uncrackable combination of invisible ink and artificial intelligence - An Uncrackable Combination of Invisible Ink and Artificial Intelligence      (via sciencedaily.com) 

Coded messages in invisible ink sound like something only found in espionage books, but in real life...