Results 91 to 100 of about 690,729 (282)
Direct anonymous authentication scheme for wireless networks under trusted computing
Based on direct anonymous attestation of trusted computing,a wireless anonymous authentication scheme was proposed,the platform of the mobile node was verified by the foreign network agent and the identity of the mobile node user was authenticated by the
YANG Li1 +3 more
doaj +2 more sources
Large Language Model‐Based Chatbots in Higher Education
The use of large language models (LLMs) in higher education can facilitate personalized learning experiences, advance asynchronized learning, and support instructors, students, and researchers across diverse fields. The development of regulations and guidelines that address ethical and legal issues is essential to ensure safe and responsible adaptation
Defne Yigci +4 more
wiley +1 more source
gap – Practical Anonymous Networking [PDF]
This paper describes how anonymity is achieved in gnunet, a framework for anonymous distributed and secure networking.
Krista Bennett, Christian Grothoff
openaire +1 more source
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury +2 more
wiley +1 more source
Abstract Germany's Renewable Energy Sources Act (REA), enacted in 2000 and subsequently amended, subsidized national renewable energy production with fixed feed‐in tariffs for renewable energy sources (RE) from wind, solar, and biogas. Empirical studies suggest that the policy was creating windfall effects for landowners and attribute farmland use ...
Lars Isenhardt +6 more
wiley +1 more source
Abstract While multiple factors explain low adoption rates of improved varieties by small‐scale farmers in sub‐Saharan Africa, a key supply‐side constraint is the limited availability of seed embodying new traits in the volume, quality, price, and timeliness required by farmers. This constraint is partly attributable to classical failures in the market
Dawit Mekonnen +5 more
wiley +1 more source
Survey of research on Tor-based anonymous networking technologies
In recent years, with the continuous development of network attack techniques, anonymous network technologies represented by Tor have faced performance bottlenecks and security challenges.
ZHU Yufei +6 more
doaj
Unmasking the True Identity: Unveiling the Secrets of Virtual Private Networks and Proxies
The growing use of VPNs, proxy servers, and Tor browsers has significantly enhanced online privacy and anonymity. However, these technologies are also exploited by cybercriminals to obscure their identities, posing serious cybersecurity threats. Existing
Vikas Kumar Jain +5 more
doaj +1 more source
Stable and Efficient Networks with Farsighted Players: the Largest Consistent Set [PDF]
In this paper we study strategic formation of bilateral networks with farsighted players in the classic framework of Jackson and Wolinsky (1996). We use the largest consistent set (LCS)(Chwe (1994)) as the solution concept for stability.
A Bhattacharya
core
Abstract Large‐scale land reforms constitute a substantial redistribution of wealth and reallocation of agricultural land, which is a major form of asset and production input in developing countries. While land redistribution (from the rich to the poor) remains a highly controversial issue, extensive evidence on its effect is limited.
Devashish Mitra +3 more
wiley +1 more source

