Results 71 to 80 of about 690,729 (282)
Diversity of controllable anonymous communication system
With the development of network communication technology,the Tor anonymous communication system has been widely used.However,there are also some unsafe factors such as insufficient anonymity which deserves to be noticed.Thus,a diversified controllable ...
Yan-wei ZHOU, Zhen-qiang WU, Bo YANG
doaj +2 more sources
Multimodal Wearable Biosensing Meets Multidomain AI: A Pathway to Decentralized Healthcare
Multimodal biosensing meets multidomain AI. Wearable biosensors capture complementary biochemical and physiological signals, while cross‐device, population‐aware learning aligns noisy, heterogeneous streams. This Review distills key sensing modalities, fusion and calibration strategies, and privacy‐preserving deployment pathways that transform ...
Chenshu Liu +10 more
wiley +1 more source
A ZigBee network anonymous authentication scheme based on Chebyshev chaotic mapping and CRT
A ZigBee network anonymous authentication scheme based on Chebyshev chaotic mapping and Chinese remainder theorem (CRT) was proposed to solve the problems such as the incomplete reliability of ZigBee network trust center and the lack of identity ...
Wei LIAO +4 more
doaj +2 more sources
Pricing for Online Resource Allocation: Intervals and Paths
We present pricing mechanisms for several online resource allocation problems which obtain tight or nearly tight approximations to social welfare. In our settings, buyers arrive online and purchase bundles of items; buyers' values for the bundles are ...
Chawla, Shuchi +2 more
core +1 more source
Beyond the Ban—Shedding Light on Smallholders' Price Vulnerability in Indonesia's Palm Oil Industry
ABSTRACT The Indonesian government imposed a palm oil export ban in April 2022 to address rising cooking oil prices. This study explores oil palm smallholders' vulnerability to the policy using descriptive statistics, Lasso, and post‐Lasso OLS regressions.
Charlotte‐Elena Reich +3 more
wiley +1 more source
Distributed anonymous authentication scheme based on the blockchain in VANET
Identity authentication is the first line of defense against malicious vehicles spreading false traffic information.However, due to the limited network bandwidth and computing power in the vehicle ad-hoc network (VANET), the existing schemes cannot meet ...
Xia FENG +3 more
doaj +2 more sources
Trust in Anonymity Networks [PDF]
Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusiness and eLeisure, as well as personal freedom of speech in authoritarian societies.
Sassone, Vladimiro +2 more
openaire +2 more sources
Anonymous transmission in a noisy quantum network using the W state
We consider the task of anonymously transmitting a quantum message in a network. We present a protocol that accomplishes this task using the W state and we analyze its performance in a quantum network where some form of noise is present.
Lipinska, Victoria +2 more
core +1 more source
ABSTRACT This study investigates the financial literacy (FL) of Swedish farmers, its linkages to farmer characteristics, management accounting practices and farm outcomes by surveying Swedish Farm Accountancy Data Network farmers. Using item response theory, we expand the existing FL measurement specifically to the farming context, assess measurement ...
Uliana Gottlieb, Helena Hansson
wiley +1 more source
Black Hole Search with Finite Automata Scattered in a Synchronous Torus
We consider the problem of locating a black hole in synchronous anonymous networks using finite state agents. A black hole is a harmful node in the network that destroys any agent visiting that node without leaving any trace.
Chalopin, Jérémie +3 more
core +5 more sources

