The paper presents how authentication and encryption is implemented in the Snow disease surveillance network. Requirements for the authentication mechanism were collected from General Practitioners (GPs). The identity of each Snow user is preserved across health institutions allowing GPs to move freely between health institutions and use the system independent of location. This ability is combined with close to zero user account administration within the participating institutions. The system provides global user certificate revocation and end-to-end encryption.
Download full-text PDF |
Source |
---|
Light Sci Appl
January 2025
Department of Materials Science and Engineering, City University of Hong Kong, Kowloon, 999077, Hong Kong SAR, China.
Low-dimensional lead-free metal halide perovskites are highly attractive for cutting-edge optoelectronic applications. Herein, we report a class of scandium-based double perovskite crystals comprising antimony dopants that can generate multiexcitonic emissions in the ultraviolet, blue, and yellow spectral regions. Owing to the zero-dimensional nature of the crystal lattice that minimizes energy crosstalk, different excitonic states in the crystals can be selectively excited by ultraviolet light, X-ray irradiation, and mechanical action, enabling dynamic control of steady/transient-state spectral features by modulating the excitation modes.
View Article and Find Full Text PDFSci Rep
December 2024
Faculty of Engineering and Technology, Multimedia University, Melaka, Malaysia.
Vehicle-to-everything (V2X) communication has many benefits. It improves fuel efficiency, road safety, and traffic management. But it raises privacy and security concerns.
View Article and Find Full Text PDFSensors (Basel)
November 2024
School of Computing and Information Sciences, Anglia Ruskin University, Cambridge CB1 1PT, UK.
Today, many businesses use near-field communications (NFC) payment solutions, which allow them to receive payments from customers quickly and smoothly. However, this technology comes with cyber security risks which must be analyzed and mitigated. This study explores the cyber risks associated with NFC transactions and examines strategies for mitigating these risks, focusing on payment devices.
View Article and Find Full Text PDFCryptogr Commun
April 2024
Digital Security, Radboud University, Toernooiveld 212, Nijmegen, 6525 EC The Netherlands.
Many modern cryptographic primitives for hashing and (authenticated) encryption make use of constructions that are instantiated with an iterated cryptographic permutation that operates on a fixed-width state consisting of an array of bits. Often, such permutations are the repeated application of a relatively simple round function consisting of a linear layer and a non-linear layer. These constructions do not require that the underlying function is a permutation and they can plausibly be based on a non-invertible transformation.
View Article and Find Full Text PDFAdv Mater
December 2024
National Laboratory of Solid State Microstructures, Key Laboratory of Intelligent Optical Sensing and Manipulation, College of Engineering and Applied Sciences, and Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing, 210023, China.
Physical unclonable functions (PUFs) are emerging as a cutting-edge technology for enhancing information security by providing robust security authentication and non-reproducible cryptographic keys. Incorporating renewable and biocompatible materials into PUFs ensures safety for handling, compatibility with biological systems, and reduced environmental impact. However, existing PUF platforms struggle to balance high encoding capacity, diversified encryption signatures, and versatile functionalities with sustainability and biocompatibility.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!