Search query: encryption

Categories: All Categories


13142 records searched, 107 records found, 20 matches displayed

< Previous 20 articles        Next 20 articles >


Search Hints:

  • Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
  • Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
  • Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
  • Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)


Most frequent words for articles published in the last 45 days:
developed (95), climate (85), team (83), species (75), cells (74), used (72), human (64), help (61), change (60), water (60), years (60), data (57), energy (55), such (53), carbon (51), discovered (50), time (48), like (47), materials (46), even (44)


Return to the site home page

Computer Science: Encryption
Published

'PrivacyMic': For a smart speaker that doesn't eavesdrop - PrivacyMic: For a Smart Speaker That Doesn't Eavesdrop      (via sciencedaily.com) 

Microphones are perhaps the most common electronic sensor in the world, with an estimated 320 millio...

Computer Science: Encryption
Published

New twist on DNA data storage lets users preview stored files - New Twist on DNA Data Storage Lets Users Preview Stored Files      (via sciencedaily.com) 

Researchers have turned a longstanding challenge in DNA data storage into a tool, using it to offer...

Computer Science: Encryption
Published

Impenetrable optical OTP security platform - Impenetrable Optical OTP Security Platform: The Future of Data Protection      (via sciencedaily.com) 

An anticounterfeiting smart label and security platform which makes forgery fundamentally impossible...

Computer Science: Encryption
Published

One material with two functions could lead to faster memory - One Material with Two Functions Could Lead to Faster Memory      (via sciencedaily.com) 

Researchers have developed a new light-emitting memory device by integrating a resistive random-acce...

Computer Science: Encryption
Published

Quantum networks in our future - Quantum Networks in Our Future: The Next Frontier of Communication      (via sciencedaily.com) 

Investigators outline how a time-sensitive network control plane could be a key component of a worka...

Computer Science: Encryption Engineering: Biometric
Published

Radio waves for the detection of hardware tampering - Radio Waves for the Detection of Hardware Tampering      (via sciencedaily.com) 

Up to now, protecting hardware against manipulation has been a laborious business: expensive, and on...

Computer Science: Encryption
Published

Researchers propose methods for automatic detection of doxing - Researchers Propose Methods for Automatic Detection of Doxing      (via sciencedaily.com) 

A new automated approach to detect doxing -- a form of cyberbullying in which certain private or per...

Computer Science: Encryption
Published

New AI model can help prevent damaging and costly data breaches - New AI Model Can Help Prevent Damaging and Costly Data Breaches      (via sciencedaily.com) 

Privacy experts have created an AI algorithm that automatically tests privacy-preserving systems for...

Computer Science: Encryption
Published

From bits to p-bits: One step closer to probabilistic computing - From Bits to P-Bits: One Step Closer to Probabilistic Computing      (via sciencedaily.com) 

Scientists have developed a mathematical description of what happens within tiny magnets as they flu...

Computer Science: Encryption
Published

Qubits: Developing long-distance quantum telecommunications networks - Qubits: Developing Long-Distance Quantum Telecommunications Networks      (via sciencedaily.com) 

Computers, smartphones, GPS: quantum physics has enabled many technological advances. It is now open...

Computer Science: Encryption
Published

Tiny magnets could hold the secret to new quantum computers - Tiny Magnets: The Key to Unlocking the Potential of Quantum Computers      (via sciencedaily.com) 

Scientists have discovered a type of magnetic behavior that could help enable magnetically based qua...

Computer Science: Encryption
Published

IT security: Computer attacks with laser light - IT Security: Protecting Against Computer Attacks with Laser Light      (via sciencedaily.com) 

Computer systems that are physically isolated from the outside world (air-gapped) can still be attac...

Computer Science: Encryption
Published

New chip hides wireless messages in plain sight - New Chip Hides Wireless Messages in Plain Sight      (via sciencedaily.com) 

Researchers have developed a method for incorporating security in the physical nature of the wireles...

Computer Science: Encryption
Published

Big data privacy for machine learning just got 100 times cheaper - Big Data Privacy for Machine Learning Just Got 100 Times Cheaper      (via sciencedaily.com) 

Computer scientists have discovered an inexpensive way for tech companies to implement a rigorous fo...

Computer Science: Encryption
Published

Smart devices: Putting a premium on peace of mind - Smart Devices: Putting a Premium on Peace of Mind      (via sciencedaily.com) 

The White House has announced plans to roll out voluntary labeling for internet-connected devices li...

Computer Science: Encryption Mathematics: Puzzles
Published

A key role for quantum entanglement - A Key Role for Quantum Entanglement      (via sciencedaily.com) 

A method known as quantum key distribution has long held the promise of communication security unatt...