Results 71 to 80 of about 690,729 (282)

Diversity of controllable anonymous communication system

open access: yesTongxin xuebao, 2015
With the development of network communication technology,the Tor anonymous communication system has been widely used.However,there are also some unsafe factors such as insufficient anonymity which deserves to be noticed.Thus,a diversified controllable ...
Yan-wei ZHOU, Zhen-qiang WU, Bo YANG
doaj   +2 more sources

Multimodal Wearable Biosensing Meets Multidomain AI: A Pathway to Decentralized Healthcare

open access: yesAdvanced Science, EarlyView.
Multimodal biosensing meets multidomain AI. Wearable biosensors capture complementary biochemical and physiological signals, while cross‐device, population‐aware learning aligns noisy, heterogeneous streams. This Review distills key sensing modalities, fusion and calibration strategies, and privacy‐preserving deployment pathways that transform ...
Chenshu Liu   +10 more
wiley   +1 more source

A ZigBee network anonymous authentication scheme based on Chebyshev chaotic mapping and CRT

open access: yes物联网学报, 2023
A ZigBee network anonymous authentication scheme based on Chebyshev chaotic mapping and Chinese remainder theorem (CRT) was proposed to solve the problems such as the incomplete reliability of ZigBee network trust center and the lack of identity ...
Wei LIAO   +4 more
doaj   +2 more sources

Pricing for Online Resource Allocation: Intervals and Paths

open access: yes, 2018
We present pricing mechanisms for several online resource allocation problems which obtain tight or nearly tight approximations to social welfare. In our settings, buyers arrive online and purchase bundles of items; buyers' values for the bundles are ...
Chawla, Shuchi   +2 more
core   +1 more source

Beyond the Ban—Shedding Light on Smallholders' Price Vulnerability in Indonesia's Palm Oil Industry

open access: yesApplied Economic Perspectives and Policy, EarlyView.
ABSTRACT The Indonesian government imposed a palm oil export ban in April 2022 to address rising cooking oil prices. This study explores oil palm smallholders' vulnerability to the policy using descriptive statistics, Lasso, and post‐Lasso OLS regressions.
Charlotte‐Elena Reich   +3 more
wiley   +1 more source

Distributed anonymous authentication scheme based on the blockchain in VANET

open access: yesTongxin xuebao, 2022
Identity authentication is the first line of defense against malicious vehicles spreading false traffic information.However, due to the limited network bandwidth and computing power in the vehicle ad-hoc network (VANET), the existing schemes cannot meet ...
Xia FENG   +3 more
doaj   +2 more sources

Trust in Anonymity Networks [PDF]

open access: yes, 2010
Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusiness and eLeisure, as well as personal freedom of speech in authoritarian societies.
Sassone, Vladimiro   +2 more
openaire   +2 more sources

Anonymous transmission in a noisy quantum network using the W state

open access: yes, 2018
We consider the task of anonymously transmitting a quantum message in a network. We present a protocol that accomplishes this task using the W state and we analyze its performance in a quantum network where some form of noise is present.
Lipinska, Victoria   +2 more
core   +1 more source

Farmers' Financial Literacy—Scale Development and Linkages to Accounting Practices and Financial Outcomes

open access: yesAgribusiness, EarlyView.
ABSTRACT This study investigates the financial literacy (FL) of Swedish farmers, its linkages to farmer characteristics, management accounting practices and farm outcomes by surveying Swedish Farm Accountancy Data Network farmers. Using item response theory, we expand the existing FL measurement specifically to the farming context, assess measurement ...
Uliana Gottlieb, Helena Hansson
wiley   +1 more source

Black Hole Search with Finite Automata Scattered in a Synchronous Torus

open access: yes, 2011
We consider the problem of locating a black hole in synchronous anonymous networks using finite state agents. A black hole is a harmful node in the network that destroys any agent visiting that node without leaving any trace.
Chalopin, Jérémie   +3 more
core   +5 more sources

Home - About - Disclaimer - Privacy