Search query: security

Categories: All Categories


13142 records searched, 334 records found, 20 matches displayed

< Previous 20 articles        Next 20 articles >


Search Hints:

  • Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
  • Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
  • Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
  • Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)


Most frequent words for articles published in the last 45 days:
developed (95), climate (85), team (83), species (75), cells (74), used (72), human (64), help (61), change (60), water (60), years (60), data (57), energy (55), such (53), carbon (51), discovered (50), time (48), like (47), materials (46), even (44)


Return to the site home page

Computer Science: Encryption
Published

A security technique to fool would-be cyber attackers - A Security Technique to Fool Would-Be Cyber Attackers      (via sciencedaily.com) 

Researchers developed a technique that effectively protects computer programs' secret information fr...

Computer Science: General Computer Science: Quantum Computers Physics: Quantum Computing
Published

Shedding light on quantum photonics - Shedding Light on Quantum Photonics      (via sciencedaily.com) 

As buzz grows ever louder over the future of quantum, researchers everywhere are working overtime to...

Physics: Optics
Published

Researchers demonstrate noise-free communication with structured light - Researchers Demonstrate Noise-Free Communication with Structured Light      (via sciencedaily.com)     Original source 

Scientists used a new invariant property of vectorial light to encode information. This quantity, wh...

Computer Science: Encryption
Published

Big data privacy for machine learning just got 100 times cheaper - Big Data Privacy for Machine Learning Just Got 100 Times Cheaper      (via sciencedaily.com) 

Computer scientists have discovered an inexpensive way for tech companies to implement a rigorous fo...

Computer Science: Encryption
Published

Cybersecurity vulnerabilities of common seismological equipment - Cybersecurity Vulnerabilities of Common Seismological Equipment      (via sciencedaily.com) 

Seismic monitoring devices linked to the internet are vulnerable to cyberattacks that could disrupt...

Computer Science: Encryption
Published

Quantum networks in our future - Quantum Networks in Our Future: The Next Frontier of Communication      (via sciencedaily.com) 

Investigators outline how a time-sensitive network control plane could be a key component of a worka...

Computer Science: Encryption
Published

New chip hides wireless messages in plain sight - New Chip Hides Wireless Messages in Plain Sight      (via sciencedaily.com) 

Researchers have developed a method for incorporating security in the physical nature of the wireles ...

Computer Science: Encryption Mathematics: Puzzles
Published

Using quantum Parrondo’s random walks for encryption - Using Quantum Parrondo's Random Walks for Encryption      (via sciencedaily.com) 

SUTD has set out to apply concepts from quantum Parrondo's paradox in search of a working protocol f...

Mathematics: Puzzles
Published

Researchers use tiny magnetic swirls to generate true random numbers - Researchers Use Tiny Magnetic Swirls to Generate True Random Numbers      (via sciencedaily.com) 

Skyrmions, tiny magnetic anomalies that arise in two-dimensional materials, can be used to generate...

Engineering: Biometric
Published

Bulletproof fingerprint technology takes images in the round - Bulletproof Fingerprint Technology Takes Images in the Round      (via sciencedaily.com) 

Experts have developed a unique method for retrieving high resolution images of fingermarks from cur...

Engineering: Biometric
Published

Lasers and terahertz waves combined in camera that sees 'unseen' detail - Lasers and Terahertz Waves Combined in Camera That Sees 'Unseen' Detail      (via sciencedaily.com) 

A team of physicists has successfully developed the first nonlinear camera capable of capturing high...

Computer Science: Quantum Computers
Published

The entanglement advantage - The Entanglement Advantage: How Quantum Computing is Revolutionizing Technology      (via sciencedaily.com) 

Researchers have demonstrated a way to entangle atoms to create a network of atomic clocks and accel...

Computer Science: General
Published

Not too big: Machine learning tames huge data sets      (via sciencedaily.com) 

A machine-learning algorithm demonstrated the capability to process data that exceeds a computer's a...

Biology: Zoology Ecology: Sea Life Geoscience: Environmental Issues Geoscience: Geography
Published

A 'fish cartel' for Africa could benefit the countries, and their seas      (via sciencedaily.com)     Original source 

Banding together to sell fishing rights could generate economic benefits for African countries, whic...

Biology: Botany Computer Science: General Ecology: Endangered Species
Published

AI drones to help farmers optimize vegetable yields      (via sciencedaily.com)     Original source 

For reasons of food security and economic incentive, farmers continuously seek to maximize their mar ...

Computer Science: General
Published

Engineers develop hack to make automotive radar 'hallucinate'      (via sciencedaily.com)     Original source 

Engineers have demonstrated a system they've dubbed 'MadRadar' for fooling automotive radar sensors...

Geoscience: Environmental Issues
Published

Alaska Native tribes take lead on shellfish toxin testing where state falls short      (via sciencedaily.com)     Original source 

A group of coastal Alaska Native tribes in 2016 began monitoring shellfish, a traditional harvest, f...