Search query: theft

Categories: All Categories


13142 records searched, 13 records found


Search Hints:

  • Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
  • Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
  • Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
  • Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)


Most frequent words for articles published in the last 45 days:
developed (95), climate (85), team (83), species (75), cells (74), used (72), human (64), help (61), change (60), water (60), years (60), data (57), energy (55), such (53), carbon (51), discovered (50), time (48), like (47), materials (46), even (44)


Return to the site home page

Physics: Optics
Published

New anti-counterfeit technique packs two light-reactive images into one material      (via sciencedaily.com)     Original source 

Growing concern about data theft and counterfeiting has inspired increasingly sophisticated security ...

Engineering: Biometric
Published

New test to snare those lying about a person's identity - New Test to Snare Those Lying About a Person's Identity      (via sciencedaily.com) 

A new test could help police to determine when criminals or witnesses are lying about their knowledg...

Engineering: Biometric
Published

Face off for best ID checkers - Face Off for Best ID Checkers      (via sciencedaily.com) 

The Glasgow Face Matching Test has been updated to find super-recognizers who can help prevent error...

Computer Science: Encryption
Published

Cybersecurity vulnerabilities of common seismological equipment - Cybersecurity Vulnerabilities of Common Seismological Equipment      (via sciencedaily.com) 

Seismic monitoring devices linked to the internet are vulnerable to cyberattacks that could disrupt...

Computer Science: Encryption Mathematics: Puzzles
Published

Using quantum Parrondo’s random walks for encryption - Using Quantum Parrondo's Random Walks for Encryption      (via sciencedaily.com) 

SUTD has set out to apply concepts from quantum Parrondo's paradox in search of a working protocol f...

Computer Science: Artificial Intelligence (AI)
Published

Real or fake text? We can learn to spot the difference - Real or Fake Text? We Can Learn to Spot the Difference      (via sciencedaily.com) 

While apprehensions about employment and schools dominate headlines, the truth is that the effects o...

Computer Science: Encryption
Published

New AI model can help prevent damaging and costly data breaches - New AI Model Can Help Prevent Damaging and Costly Data Breaches      (via sciencedaily.com) 

Privacy experts have created an AI algorithm that automatically tests privacy-preserving systems for...

Engineering: Biometric
Published

Sniffing out your identity with breath biometrics - Sniffing Out Your Identity with Breath Biometrics      (via sciencedaily.com) 

Researchers have developed an artificial 'nose' that can identify individuals from their breath. Bui...

Engineering: Biometric
Published

Many US adults worry about facial image data in healthcare settings - Many US Adults Worry About Facial Image Data in Healthcare Settings      (via sciencedaily.com) 

Uses of facial images and facial recognition technologies -- to unlock a phone or in airport securit...

Engineering: Biometric
Published

High-security identification that cannot be counterfeited - High-Security Identification That Cannot Be Counterfeited      (via sciencedaily.com) 

Researcher have used the principles that underpin the whispering-gallery effect to create an unbeata...

Computer Science: Encryption
Published

A security technique to fool would-be cyber attackers - A Security Technique to Fool Would-Be Cyber Attackers      (via sciencedaily.com) 

Researchers developed a technique that effectively protects computer programs' secret information fr...

No more articles found that match the search criteria