Search query: encryption

Categories: All Categories


13142 records searched, 107 records found, 20 matches displayed

< Previous 20 articles        Next 20 articles >


Search Hints:

  • Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
  • Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
  • Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
  • Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)


Most frequent words for articles published in the last 45 days:
developed (95), climate (85), team (83), species (75), cells (74), used (72), human (64), help (61), change (60), water (60), years (60), data (57), energy (55), such (53), carbon (51), discovered (50), time (48), like (47), materials (46), even (44)


Return to the site home page

Computer Science: Encryption
Published

Compact quantum computer for server centers - Compact Quantum Computer for Server Centers: The Future of Computing      (via sciencedaily.com) 

Quantum computers have been one-of-a-kind devices that fill entire laboratories. Now, physicists hav...

Computer Science: Encryption
Published

Thinking like a cyber-attacker to protect user data - Thinking Like a Cyber-Attacker to Protect User Data      (via sciencedaily.com) 

Researchers have shown that a component of modern computer processors that enables different areas o...

Computer Science: Encryption
Published

Quantum computing: When ignorance is wanted - Quantum Computing: When Ignorance is Wanted      (via sciencedaily.com) 

Quantum technologies for computers open up new concepts of preserving the privacy of input and outpu...

Computer Science: Encryption
Published

Cybersecurity vulnerabilities of common seismological equipment - Cybersecurity Vulnerabilities of Common Seismological Equipment      (via sciencedaily.com) 

Seismic monitoring devices linked to the internet are vulnerable to cyberattacks that could disrupt...

Mathematics: Puzzles
Published

Researchers use tiny magnetic swirls to generate true random numbers - Researchers Use Tiny Magnetic Swirls to Generate True Random Numbers      (via sciencedaily.com) 

Skyrmions, tiny magnetic anomalies that arise in two-dimensional materials, can be used to generate...

Computer Science: Encryption Mathematics: Puzzles
Published

Laser system generates random numbers at ultrafast speeds - Laser System Generates Random Numbers at Ultrafast Speeds      (via sciencedaily.com) 

Scientists have developed a system that can generate random numbers over a hundred times faster than...

Computer Science: Encryption
Published

Double locked: Polymer hydrogels secure confidential information - Double Locked: Polymer Hydrogels Secure Confidential Information      (via sciencedaily.com) 

The development of highly secure but simple and inexpensive encryption technology for the prevention ...

Computer Science: Encryption
Published

A nanoantenna for long-distance, ultra-secure communication - A Nanoantenna for Long-Distance, Ultra-Secure Communication      (via sciencedaily.com) 

Researchers have used a nanoantenna to focus light onto a single semiconductor nanobox. This approac...

Mathematics: Statistics
Published

Researchers discover a uniquely quantum effect in erasing information - Researchers Discover a Uniquely Quantum Effect in Erasing Information      (via sciencedaily.com)     Original source 

Researchers have discovered a uniquely quantum effect in erasing information that may have significa...

Computer Science: Encryption
Published

Researchers simulate privacy leaks in functional genomics studies - Researchers Simulate Privacy Leaks in Functional Genomics Studies      (via sciencedaily.com)     Original source 

Researchers demonstrate that it's possible to de-identify raw functional genomics data to ensure pat...