Results 61 to 70 of about 1,611 (184)

Algebraic and Slide Attacks on KeeLoq [PDF]

open access: yes, 2008
KeeLoq is a block cipher used in wireless devices that unlock the doors and alarms in cars manufactured by Chrysler, Daewoo, Fiat, GM, Honda, Jaguar, Toyota, Volvo, Volkswagen, etc [8,9,33,34]. KeeLoq is inexpensive to implement and economical in gate count, yet according to Microchip [33] it should have "a level of security comparable to DES".
Nicolas T. Courtois   +2 more
openaire   +1 more source

Gap Symmetry, Electronic Structure and Interplay Between Superconductivity and Spin Density Wave in Sr1−xKxFe2As2 Superconductor

open access: yesNano Select, EarlyView.
In moderately hole‐doped Sr1−xKxFe2As2${\rm Sr}_{1-x}{\rm K}_x{\rm Fe}_2{\rm As}_2$ system the pairing state is s+−${\rm s}^{+-}$ wave pairing state mediated by spin fluctuations. As the SDW order parameter increases, TC${\rm T}_C$ decreases and TM${\rm T}_M$ increases. As temperature increases, the SDW order parameter decreases and vanishes at TM${\rm
Gedefaw Mebratie   +2 more
wiley   +1 more source

Robustness Assessment of Public Transport Networks in Various Graph Representations: Systematic Review, Decision Support, and Case Study

open access: yesNetworks, EarlyView.
ABSTRACT The analysis of certain properties of the underlying graph of a public transport network generates insights about the network's structure. Hereby, the choice of the graph representation depends on a trade‐off between complexity reduction and information preservation to adequately model a public transport network.
Michael Palk   +2 more
wiley   +1 more source

Initial State Privacy of Nonlinear Systems on Riemannian Manifolds

open access: yesInternational Journal of Robust and Nonlinear Control, EarlyView.
ABSTRACT In this paper, we investigate initial state privacy protection for discrete‐time nonlinear closed systems. By capturing Riemannian geometric structures inherent in such privacy challenges, we refine the concept of differential privacy through the introduction of an initial state adjacency set based on Riemannian distances.
Le Liu, Yu Kawano, Antai Xie, Ming Cao
wiley   +1 more source

Modeling the Thermal Properties of Hydrogen‐Based Direct Reduced Iron Using Computational Thermodynamics and Machine Learning

open access: yessteel research international, EarlyView.
Hydrogen‐based direct reduced iron (H‐DRI) melts differently from scrap and carbon‐bearing DRI. This work combines differential scanning calorimetry experiments, FactSage thermodynamics, and simple composition‐based regression to predict solidus, liquidus, heat capacity, and enthalpy for H‐DRI.
Ankur Agnihotri   +3 more
wiley   +1 more source

WSN key recovery attack based on symmetric matrix decomposition

open access: yesTongxin xuebao, 2018
The key protocol is one of the crucial technologies to ensure the security for wireless sensor network(WSN).Parakh,et al.proposed a key agreement for WSN based on matrix decomposition.However,the study revealed that the protocol had security risks.A key ...
Xiangmin JI   +5 more
doaj   +2 more sources

Measuring the time‐varying market efficiency in the prewar and wartime Japanese stock market, 1924–1943

open access: yesAsia‐Pacific Economic History Review, Volume 65, Issue 1, Page 131-159, March 2025.
Abstract This study examines the adaptive market hypothesis in the prewar and wartime Japanese stock market using a new market capitalization‐weighted price index. First, we find that the degree of market efficiency varies over time and with major historical events. This implies that the hypothesis is supported in this market.
Kenichi Hirayama, Akihiko Noda
wiley   +1 more source

Why did Putin invade Ukraine? A theory of degenerate autocracy

open access: yesAmerican Journal of Political Science, EarlyView.
Abstract Many dictatorships end up with a series of disastrous decisions such as Hitler's attack on the Soviet Union or Saddam Hussein's aggression against Kuwait. Even if a certain policy choice is not ultimately fatal for the regime, such as Mao's Big Leap Forward or the Pol Pot's collectivization drive, they typically involve both a miscalculation ...
Georgy Egorov, Konstantin Sonin
wiley   +1 more source

Attack Tree Metrics are Operad Algebras

open access: yes2024 IEEE 37th Computer Security Foundations Symposium (CSF)
Attack Trees (ATs) are a widely used tool for security analysis. ATs can be employed in quantitative security analysis through metrics, which assign a security value to an AT. Many different AT metrics exist, and there exist multiple general definitions that aim to study a wide variety of AT metrics at once.
openaire   +3 more sources

Lucid Dreaming Frequency Associated With Grey–White Matter Networks: An Exploratory Multimodal MRI Study

open access: yesJournal of Sleep Research, EarlyView.
ABSTRACT Lucid dreaming, defined as the experience of becoming aware of dreaming while dreaming, offers a unique window into a state of consciousness characterised by a blending of the sensory vividness of REM sleep with the self‐awareness of wakefulness. While past functional imaging has shed light on the neural activity supporting lucid dreaming, the
Nicola De Pisapia   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy