Articles with "security applications" as a keyword



Photo from wikipedia

Harnessing Polymer‐Matrix‐Mediated Manipulation of Intermolecular Charge‐Transfer for Near‐Infrared Security Applications

Sign Up to like & get
recommendations!
Published in 2022 at "Advanced Materials"

DOI: 10.1002/adma.202204749

Abstract: Precise recognition of near‐infrared (NIR) signals holds great prospects in optical communication, remote sensing, information security, and anti‐counterfeiting. For these applications, filters with good NIR transparency are typically essential components. Currently, such NIR transparent filters… read more here.

Keywords: information; near infrared; security applications; charge transfer ... See more keywords
Photo by adrienl from unsplash

Fabrication of flux supported SrTiO3:Eu3+ fluorescent powders: New prospective of dual mode, ink-free data security applications

Sign Up to like & get
recommendations!
Published in 2020 at "Journal of Science: Advanced Materials and Devices"

DOI: 10.1016/j.jsamd.2020.11.004

Abstract: Abstract In the present paper, various fluxes assisted Eu3+ doped SrTiO3 nanophosphors were prepared via a solution combustion route. Among all fluxes, NH4F was found to be an appropriate one, which can reduce the forming… read more here.

Keywords: dual mode; mode; mode ink; srtio3 eu3 ... See more keywords
Photo from wikipedia

Audio Watermarking for Security and Non-Security Applications (December 2021)

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3145950

Abstract: The digitization of audiovisual data is significantly increasing. Thus, in order to guarantee principally the protection of intellectual properties of this digital content, watermarking has appeared as a solution. The watermarking can be used in… read more here.

Keywords: watermarking security; security applications; security; non security ... See more keywords
Photo from wikipedia

Physically Unclonable Function Using GSHE Driven SOT Assisted p-MTJ for Next Generation Hardware Security Applications

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3203817

Abstract: The increasing threat of security attacks on hardware security applications has driven research towards exploring beyond CMOS devices as an alternative. Spintronic devices offer advantages like low power, non-volatility, inherent spatial and temporal randomness, simplicity… read more here.

Keywords: hardware security; generation hardware; physically unclonable; security applications ... See more keywords