Results 101 to 110 of about 38,362 (243)

A Guide to Machine Learning Epistemic Ignorance, Hidden Paradoxes, and Other Tensions

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 15, Issue 3, September 2025.
ABSTRACT Machine learning (ML) has rapidly scaled in capacity and complexity, yet blind spots persist beneath its high performance façade. In order to shed more light on this argument, this paper presents a curated catalogue of 175 unconventional concepts, each capturing a paradox, tension, or overlooked risk in modern ML practice.
M. Z. Naser
wiley   +1 more source

A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components [PDF]

open access: yes, 2017
The semiconductor industry is fully globalized and integrated circuits (ICs) are commonly defined, designed and fabricated in different premises across the world. This reduces production costs, but also exposes ICs to supply chain attacks, where insiders
Cerulli, Andrea   +5 more
core   +1 more source

Singapore upon the Korea Strait? Cyberlibertarian Desires and Anxious Regulation in Busan's Blockchain Regulation Free Zone

open access: yesAntipode, Volume 57, Issue 5, Page 1892-1913, September 2025.
Abstract This article examines the intersection of Asia's blockchain industry and special economic zones (SEZs). SEZs have been promoted to localise blockchain technology by disparate actors from cyberlibertarian figures to Asian blockchain firms, national policymakers, and local politicians.
Jamie Doucette, Seung‐Ook Lee
wiley   +1 more source

Design keyed Hash function based on couple chaotic system

open access: yesTongxin xuebao, 2006
Analyzed the chaotic and cryptographic properties of a piecewise nonlinear map, a couple chaotic digital sys-tem was proposed based on perturbing which used the piecewise nonlinear, then a new approach to construct keyed Hash function was presented.
WEI Peng-cheng1   +3 more
doaj   +2 more sources

Enhancing Data Privacy and Trust in E‐Learning: A Blockchain‐Based Access Control Protocol for Cloud Educational Systems

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 18-20, 30 August 2025.
ABSTRACT E‐learning systems in an educational environment designed for wireless area networks for schools, universities, and research institutions provide consistency and better retention for students, professors, and researchers. An E‐learning system is known for storing lecture documents and live video conferences that are transmitted over public ...
Ahmed A. Mawgoud   +4 more
wiley   +1 more source

Reducing Power of BLAKE3 implementations with dedicated FPGA resources [PDF]

open access: yesInternational Journal of Electronics and Telecommunications
The BLAKE cryptographic hash functions are efficiently expressed in software; however, their hardware implementations do not match the speed and power efficiency of alternative methods.
Jarosław Sugier
doaj   +1 more source

Fraud Detection in Privacy Preserving Health Insurance System Using Blockchain Technology

open access: yesEngineering Reports, Volume 7, Issue 8, August 2025.
A privacy‐preserving and fraud‐detection‐enabled health insurance claim system has been proposed that addresses the dual challenges of privacy preservation and fraud detection in health insurance claims. The proposed model enables both patients and healthcare providers to submit claims securely, ensuring patient anonymity while effectively detecting ...
Md. Mazharul Islam   +4 more
wiley   +1 more source

A perceptual hash function to store and retrieve large scale DNA sequences

open access: yes, 2014
This paper proposes a novel approach for storing and retrieving massive DNA sequences.. The method is based on a perceptual hash function, commonly used to determine the similarity between digital images, that we adapted for DNA sequences.
Bailly, Xavier   +3 more
core  

Leveraging Blockchain and Smart Contracts to Combat Greenwashing in Sustainable Development

open access: yesSustainable Development, Volume 33, Issue 4, Page 5874-5889, August 2025.
ABSTRACT Blockchain technology, when combined with smart contracts, enables buyers to distinguish between greenwashed and genuinely eco‐friendly products. The presence of counterfeit items can severely impact supply chains by diminishing brand value, eroding consumer confidence, and undermining market trust.
Ragnhild Silkoset, Arne Nygaard
wiley   +1 more source

Optimising the SHA‐512 cryptographic hash function on FPGAs

open access: yesIET Computers & Digital Techniques, 2014
In this study, novel pipelined architectures, optimised in terms of throughput and throughput/area factors, for the SHA-512 cryptographic hash function, are proposed. To achieve this, algorithmic- and circuit-level optimisation techniques such as loop unrolling, re-timing, temporal pre-computation, resource re-ordering and pipeline are applied. All the
Athanasiou, George S.   +3 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy