Results 101 to 110 of about 38,362 (243)
A Guide to Machine Learning Epistemic Ignorance, Hidden Paradoxes, and Other Tensions
ABSTRACT Machine learning (ML) has rapidly scaled in capacity and complexity, yet blind spots persist beneath its high performance façade. In order to shed more light on this argument, this paper presents a curated catalogue of 175 unconventional concepts, each capturing a paradox, tension, or overlooked risk in modern ML practice.
M. Z. Naser
wiley +1 more source
A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components [PDF]
The semiconductor industry is fully globalized and integrated circuits (ICs) are commonly defined, designed and fabricated in different premises across the world. This reduces production costs, but also exposes ICs to supply chain attacks, where insiders
Cerulli, Andrea+5 more
core +1 more source
Abstract This article examines the intersection of Asia's blockchain industry and special economic zones (SEZs). SEZs have been promoted to localise blockchain technology by disparate actors from cyberlibertarian figures to Asian blockchain firms, national policymakers, and local politicians.
Jamie Doucette, Seung‐Ook Lee
wiley +1 more source
Design keyed Hash function based on couple chaotic system
Analyzed the chaotic and cryptographic properties of a piecewise nonlinear map, a couple chaotic digital sys-tem was proposed based on perturbing which used the piecewise nonlinear, then a new approach to construct keyed Hash function was presented.
WEI Peng-cheng1+3 more
doaj +2 more sources
ABSTRACT E‐learning systems in an educational environment designed for wireless area networks for schools, universities, and research institutions provide consistency and better retention for students, professors, and researchers. An E‐learning system is known for storing lecture documents and live video conferences that are transmitted over public ...
Ahmed A. Mawgoud+4 more
wiley +1 more source
Reducing Power of BLAKE3 implementations with dedicated FPGA resources [PDF]
The BLAKE cryptographic hash functions are efficiently expressed in software; however, their hardware implementations do not match the speed and power efficiency of alternative methods.
Jarosław Sugier
doaj +1 more source
Fraud Detection in Privacy Preserving Health Insurance System Using Blockchain Technology
A privacy‐preserving and fraud‐detection‐enabled health insurance claim system has been proposed that addresses the dual challenges of privacy preservation and fraud detection in health insurance claims. The proposed model enables both patients and healthcare providers to submit claims securely, ensuring patient anonymity while effectively detecting ...
Md. Mazharul Islam+4 more
wiley +1 more source
A perceptual hash function to store and retrieve large scale DNA sequences
This paper proposes a novel approach for storing and retrieving massive DNA sequences.. The method is based on a perceptual hash function, commonly used to determine the similarity between digital images, that we adapted for DNA sequences.
Bailly, Xavier+3 more
core
Leveraging Blockchain and Smart Contracts to Combat Greenwashing in Sustainable Development
ABSTRACT Blockchain technology, when combined with smart contracts, enables buyers to distinguish between greenwashed and genuinely eco‐friendly products. The presence of counterfeit items can severely impact supply chains by diminishing brand value, eroding consumer confidence, and undermining market trust.
Ragnhild Silkoset, Arne Nygaard
wiley +1 more source
Optimising the SHA‐512 cryptographic hash function on FPGAs
In this study, novel pipelined architectures, optimised in terms of throughput and throughput/area factors, for the SHA-512 cryptographic hash function, are proposed. To achieve this, algorithmic- and circuit-level optimisation techniques such as loop unrolling, re-timing, temporal pre-computation, resource re-ordering and pipeline are applied. All the
Athanasiou, George S.+3 more
openaire +3 more sources