Search query: tampering

Categories: All Categories


13142 records searched, 10 records found


Search Hints:

  • Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
  • Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
  • Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
  • Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)


Most frequent words for articles published in the last 45 days:
developed (95), climate (85), team (83), species (75), cells (74), used (72), human (64), help (61), change (60), water (60), years (60), data (57), energy (55), such (53), carbon (51), discovered (50), time (48), like (47), materials (46), even (44)


Return to the site home page

Computer Science: Encryption Engineering: Biometric
Published

Radio waves for the detection of hardware tampering - Radio Waves for the Detection of Hardware Tampering      (via sciencedaily.com) 

Up to now, protecting hardware against manipulation has been a laborious business: expensive, and on...

Engineering: Biometric
Published

This tiny, tamper-proof ID tag can authenticate almost anything      (via sciencedaily.com)     Original source 

A cryptographic tag uses terahertz waves to authenticate items by recognizing the unique pattern of...

Environmental: General Physics: General Physics: Optics Physics: Quantum Physics
Published

Accelerating waves shed light on major problems in physics      (via sciencedaily.com)     Original source 

Researchers at Tampere University and the University of Eastern Finland have reached a milestone in ...

Mathematics: Puzzles
Published

Revolutionary quantum breakthrough paves way for safer online communication - Revolutionary Quantum Breakthrough Paves Way for Safer Online Communication      (via sciencedaily.com) 

The world is one step closer to having a totally secure internet and an answer to the growing threat...

Computer Science: Encryption
Published

Graphene key for novel hardware security - Graphene Key for Novel Hardware Security      (via sciencedaily.com) 

As more private data is stored and shared digitally, researchers are exploring new ways to protect d...

Computer Science: Encryption
Published

Researchers improve data readout by using 'quantum entanglement' - Researchers Improve Data Readout by Using 'Quantum Entanglement'      (via sciencedaily.com) 

Researchers say they have been able to greatly improve the readout of data from digital memories - t...

Biology: Biochemistry Chemistry: Biochemistry
Published

Tackling counterfeit seeds with 'unclonable' labels - Tackling Counterfeit Seeds with 'Unclonable' Labels      (via sciencedaily.com) 

As a way to reduce seed counterfeiting, researchers developed a silk-based tag that, when applied to...

Computer Science: Encryption Mathematics: Puzzles
Published

Algorithms improve how we protect our data - Algorithms Improve How We Protect Our Data      (via sciencedaily.com) 

Scientists have developed algorithms that more efficiently measure how difficult it would be for an...

No more articles found that match the search criteria