Results 71 to 80 of about 75,969 (261)

Leveraging Blockchain and Smart Contracts to Combat Greenwashing in Sustainable Development

open access: yesSustainable Development, EarlyView.
ABSTRACT Blockchain technology, when combined with smart contracts, enables buyers to distinguish between greenwashed and genuinely eco‐friendly products. The presence of counterfeit items can severely impact supply chains by diminishing brand value, eroding consumer confidence, and undermining market trust.
Ragnhild Silkoset, Arne Nygaard
wiley   +1 more source

Spatiotemporal chaotic one-way Hash function construction based on coupled tent maps

open access: yesTongxin xuebao, 2007
A novel coupled tent maps-based spatiotemporal chaotic cryptographic Hash function was proposed.Compared with the discrete tent map,the coupled discrete tent spatiotemporal chaotic maps have longer computer-realization-period,nearly uniform distribution ...
LIU Jian-dong, FU Xiu-li
doaj   +2 more sources

Investigating Developer Sentiments in Software Components: An Exploratory Case Study of Gentoo

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Background Developers, who are the main driving force behind software development, have central work in handling software components such as modules, libraries, and frameworks, which are the backbone of a project's architecture. Managing these components well ensures the smooth implementation of new features, maintains system integrity, and ...
Tien Rahayu Tulili   +2 more
wiley   +1 more source

A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids

open access: yesEntropy, 2019
Image hash is an alternative to cryptographic hash functions for checking integrity of digital images. Compared to cryptographic hash functions, an image hash or a Perceptual Hash Function (PHF) is resilient to content preserving distortions and ...
Iram Bashir   +4 more
doaj   +1 more source

Detecting brute-force attacks on cryptocurrency wallets

open access: yes, 2019
Blockchain is a distributed ledger, which is protected against malicious modifications by means of cryptographic tools, e.g. digital signatures and hash functions. One of the most prominent applications of blockchains is cryptocurrencies, such as Bitcoin.
AK Fedorov   +10 more
core   +1 more source

Practical Entropy Accumulation for Random Number Generators with Image Sensor-Based Quantum Noise Sources

open access: yesEntropy, 2023
The efficient generation of high-quality random numbers is essential in the operation of cryptographic modules. The quality of a random number generator is evaluated by the min-entropy of its entropy source.
Youngrak Choi   +2 more
doaj   +1 more source

A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis   +7 more
wiley   +1 more source

Denial-of-Service Resistance in Key Establishment [PDF]

open access: yes, 2007
Denial of Service (DoS) attacks are an increasing problem for network connected systems. Key establishment protocols are applications that are particularly vulnerable to DoS attack as they are typically required to perform computationally expensive ...
Boyd, Colin   +4 more
core   +2 more sources

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy