Search query: encryption
Categories: All Categories
13142 records searched, 107 records found, 20 matches displayed
< Previous 20 articles Next 20 articles >
Search Hints:
- Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
- Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
- Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
- Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)
Most frequent words for articles published in the last 45 days:
developed (95),
climate (85),
team (83),
species (75),
cells (74),
used (72),
human (64),
help (61),
change (60),
water (60),
years (60),
data (57),
energy (55),
such (53),
carbon (51),
discovered (50),
time (48),
like (47),
materials (46),
even (44)
Published 'PrivacyMic': For a smart speaker that doesn't eavesdrop - PrivacyMic: For a Smart Speaker That Doesn't Eavesdrop


Microphones are perhaps the most common electronic sensor in the world, with an estimated 320 millio...
Published New twist on DNA data storage lets users preview stored files - New Twist on DNA Data Storage Lets Users Preview Stored Files


Researchers have turned a longstanding challenge in DNA data storage into a tool, using it to offer...
Published Impenetrable optical OTP security platform - Impenetrable Optical OTP Security Platform: The Future of Data Protection


An anticounterfeiting smart label and security platform which makes forgery fundamentally impossible...
Published One material with two functions could lead to faster memory - One Material with Two Functions Could Lead to Faster Memory


Researchers have developed a new light-emitting memory device by integrating a resistive random-acce...
Published Quantum networks in our future - Quantum Networks in Our Future: The Next Frontier of Communication


Investigators outline how a time-sensitive network control plane could be a key component of a worka...
Published Radio waves for the detection of hardware tampering - Radio Waves for the Detection of Hardware Tampering


Up to now, protecting hardware against manipulation has been a laborious business: expensive, and on...
Published Real-world study shows the potential of gait authentication to enhance smartphone security - Real-World Study Shows the Potential of Gait Authentication to Enhance Smartphone Security


A study showed that -- within an appropriate framework -- gait recognition could be a viable techniq...
Published Quantum physicists make major nanoscopic advance - Quantum Physicists Make Major Nanoscopic Advance



In a new breakthrough, researchers have solved a problem that has caused quantum researchers headach...
Published Researchers propose methods for automatic detection of doxing - Researchers Propose Methods for Automatic Detection of Doxing


A new automated approach to detect doxing -- a form of cyberbullying in which certain private or per...
Published New AI model can help prevent damaging and costly data breaches - New AI Model Can Help Prevent Damaging and Costly Data Breaches


Privacy experts have created an AI algorithm that automatically tests privacy-preserving systems for...
Published From bits to p-bits: One step closer to probabilistic computing - From Bits to P-Bits: One Step Closer to Probabilistic Computing


Scientists have developed a mathematical description of what happens within tiny magnets as they flu...
Published Technology has the potential to change the patient-provider relationship - Technology and the Patient-Provider Relationship: A New Era of Healthcare


As personal health records (AKA patient portals) allowing patients to see test results, medications...
Published Qubits: Developing long-distance quantum telecommunications networks - Qubits: Developing Long-Distance Quantum Telecommunications Networks


Computers, smartphones, GPS: quantum physics has enabled many technological advances. It is now open...
Published Tiny magnets could hold the secret to new quantum computers - Tiny Magnets: The Key to Unlocking the Potential of Quantum Computers


Scientists have discovered a type of magnetic behavior that could help enable magnetically based qua...
Published IT security: Computer attacks with laser light - IT Security: Protecting Against Computer Attacks with Laser Light


Computer systems that are physically isolated from the outside world (air-gapped) can still be attac...
Published New chip hides wireless messages in plain sight - New Chip Hides Wireless Messages in Plain Sight


Researchers have developed a method for incorporating security in the physical nature of the wireles...
Published Big data privacy for machine learning just got 100 times cheaper - Big Data Privacy for Machine Learning Just Got 100 Times Cheaper


Computer scientists have discovered an inexpensive way for tech companies to implement a rigorous fo...
Published Smart devices: Putting a premium on peace of mind - Smart Devices: Putting a Premium on Peace of Mind


The White House has announced plans to roll out voluntary labeling for internet-connected devices li...
Published Microlaser chip adds new dimensions to quantum communication - Microlaser Chip Adds New Dimensions to Quantum Communication


With only two levels of superposition, the qubits used in today's quantum communication technologies...
Published A key role for quantum entanglement - A Key Role for Quantum Entanglement


A method known as quantum key distribution has long held the promise of communication security unatt...