Search query: tampering
Categories: All Categories
13142 records searched, 10 records found
Search Hints:
- Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
- Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
- Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
- Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)
Most frequent words for articles published in the last 45 days:
developed (95),
climate (85),
team (83),
species (75),
cells (74),
used (72),
human (64),
help (61),
change (60),
water (60),
years (60),
data (57),
energy (55),
such (53),
carbon (51),
discovered (50),
time (48),
like (47),
materials (46),
even (44)
Published Radio waves for the detection of hardware tampering - Radio Waves for the Detection of Hardware Tampering


Up to now, protecting hardware against manipulation has been a laborious business: expensive, and on...
Published This tiny, tamper-proof ID tag can authenticate almost anything



A cryptographic tag uses terahertz waves to authenticate items by recognizing the unique pattern of...
Published Accelerating waves shed light on major problems in physics



Researchers at Tampere University and the University of Eastern Finland have reached a milestone in ...
Published Revolutionary quantum breakthrough paves way for safer online communication - Revolutionary Quantum Breakthrough Paves Way for Safer Online Communication


The world is one step closer to having a totally secure internet and an answer to the growing threat...
Published Graphene key for novel hardware security - Graphene Key for Novel Hardware Security


As more private data is stored and shared digitally, researchers are exploring new ways to protect d...
Published Researchers improve data readout by using 'quantum entanglement' - Researchers Improve Data Readout by Using 'Quantum Entanglement'


Researchers say they have been able to greatly improve the readout of data from digital memories - t...
Published Tackling counterfeit seeds with 'unclonable' labels - Tackling Counterfeit Seeds with 'Unclonable' Labels


As a way to reduce seed counterfeiting, researchers developed a silk-based tag that, when applied to...
Published The optical fiber that keeps data safe even after being twisted or bent - The Optical Fiber That Keeps Data Safe Even After Being Twisted or Bent


An optical fiber that uses the mathematical concept of topology to remain robust, thereby guaranteei...
Published Scientists demonstrate unprecedented sensitivity in measuring time delay between two photons - Scientists Demonstrate Unprecedented Sensitivity in Measuring Time Delay Between Two Photons



A team of researchers has demonstrated the ultimate sensitivity allowed by quantum physics in measur...
Published Algorithms improve how we protect our data - Algorithms Improve How We Protect Our Data


Scientists have developed algorithms that more efficiently measure how difficult it would be for an...