Search query: security
Categories: All Categories
13142 records searched, 334 records found, top 20 matches displayed
Search Hints:
- Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
- Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
- Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
- Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)
Most frequent words for articles published in the last 45 days:
developed (95),
climate (85),
team (83),
species (75),
cells (74),
used (72),
human (64),
help (61),
change (60),
water (60),
years (60),
data (57),
energy (55),
such (53),
carbon (51),
discovered (50),
time (48),
like (47),
materials (46),
even (44)
Published High-security identification that cannot be counterfeited - High-Security Identification That Cannot Be Counterfeited (via sciencedaily.com)
Researcher have used the principles that underpin the whispering-gallery effect to create an unbeata...
Published Satellite security lags decades behind the state of the art (via sciencedaily.com) Original source
Researchers have tested the software of three satellites. And they found many standard security mech ...
Published Double locked: Polymer hydrogels secure confidential information - Double Locked: Polymer Hydrogels Secure Confidential Information (via sciencedaily.com)
The development of highly secure but simple and inexpensive encryption technology for the prevention ...
Published Impenetrable optical OTP security platform - Impenetrable Optical OTP Security Platform: The Future of Data Protection (via sciencedaily.com)
An anticounterfeiting smart label and security platform which makes forgery fundamentally impossible ...
Published Graphene key for novel hardware security - Graphene Key for Novel Hardware Security (via sciencedaily.com)
As more private data is stored and shared digitally, researchers are exploring new ways to protect d...
Published How randomized data can improve our security (via sciencedaily.com)
With an innovative approach, scientists are creating new standards for data security in the cache of ...
Published Accelerating AI tasks while preserving data security (via sciencedaily.com) Original source
SecureLoop is a new search engine that can identify an optimal design for a deep neural network acce ...
Published How secure are voice authentication systems really? (via sciencedaily.com) Original source
Computer scientists have discovered a method of attack that can successfully bypass voice authentica...
Published Improving efficiency, effectiveness of security X-ray technology - Improving Efficiency and Effectiveness of Security X-Ray Technology (via sciencedaily.com)
The smuggling of contraband is a threat in airport security and risks have increased in modern times ...
Published Securing data transfers with relativity - Securing Data Transfers with Relativity: A Comprehensive Guide (via sciencedaily.com)
To counter hacking, researchers have developed a new system based on the concept of 'zero-knowledge...
Published Secure communication with light particles - Secure Communication with Light Particles: A Breakthrough in Quantum Cryptography (via sciencedaily.com)
While quantum computers offer many novel possibilities, they also pose a threat to internet security ...
Published Australasia's hidden pollination crisis could threaten biodiversity and food security (via sciencedaily.com) Original source
Australasia's hidden pollination crisis, mirroring global threats, could pose a significant risk to...
Published Discovery highlights 'critical oversight' in perceived security of wireless networks (via sciencedaily.com) Original source
A research team has uncovered an eavesdropping security vulnerability in high-frequency and high-spe ...
Published Breakthrough promises secure quantum computing at home (via sciencedaily.com) Original source
The full power of next-generation quantum computing could soon be harnessed by millions of individua...
Published Researchers demonstrate secure information transfer using spatial correlations in quantum entangled beams of light - Researchers Demonstrate Secure Information Transfer Using Spatial Correlations in Quantum Entangled Beams of Light (via sciencedaily.com) Original source
Researchers have demonstrated the principle of using spatial correlations in quantum entangled beams...
Published Tiny, cheap solution for quantum-secure encryption - Tiny, Cheap Solution for Quantum-Secure Encryption (via sciencedaily.com)
Engineers propose a new kind of encryption to protect data in the age of quantum computers. ABSTRACT...
Published Novel device promotes efficient, real-time and secure wireless access (via sciencedaily.com) Original source
Researchers have created new technology for more accessible, real-time wireless connectivity....
Published Why computer security advice is more confusing than it should be (via sciencedaily.com)
If you find the computer security guidelines you get at work confusing and not very useful, you're n ...
Published Speedy, secure, sustainable -- that's the future of telecom (via sciencedaily.com) Original source
A new device that can process information using a small amount of light could enable energy-efficien...
Published Chi-Nu experiment ends with data to support nuclear security, energy reactors (via sciencedaily.com) Original source
The results of the Chi-Nu physics experiment at Los Alamos National Laboratory have contributed esse...