Results 61 to 70 of about 1,355 (213)

Singapore upon the Korea Strait? Cyberlibertarian Desires and Anxious Regulation in Busan's Blockchain Regulation Free Zone

open access: yesAntipode, Volume 57, Issue 5, Page 1892-1913, September 2025.
Abstract This article examines the intersection of Asia's blockchain industry and special economic zones (SEZs). SEZs have been promoted to localise blockchain technology by disparate actors from cyberlibertarian figures to Asian blockchain firms, national policymakers, and local politicians.
Jamie Doucette, Seung‐Ook Lee
wiley   +1 more source

Quantum Computing: Foundations, Architecture and Applications

open access: yesEngineering Reports, Volume 7, Issue 8, August 2025.
This paper presents a study on quantum computing's theoretical foundations and applications, illustrated by a quantum circuit diagram featuring gates and measurements that demonstrate qubit manipulation and entanglement. ABSTRACT Quantum computing exploits the principles of quantum mechanics to address computational problems that are intractable to ...
Christopher Columbus Chinnappan   +4 more
wiley   +1 more source

Security in Metaverse Markets: Challenges and Solutions—A Comprehensive Review

open access: yesExpert Systems, Volume 42, Issue 8, August 2025.
ABSTRACT This review paper provides a systematic overview of the metaverse markets security problems and solutions. The metaverse is an emerging digital space, bridging virtual, augmented and mixed reality environments. As the metaverse evolves, issues related to customer security have emerged, which include breaches of privacy, thefts of identity and ...
Mohammad Z. Aloudat   +3 more
wiley   +1 more source

Post-quantum signature algorithms based on the hidden discrete logarithm problem [PDF]

open access: yesComputer Science Journal of Moldova, 2018
New options of the hidden discrete logarithm problem are proposed as cryptographic primitive of the post-quantum signature algorithms. Two signature schemes using computations in finite non-commutative algebras with associative multiplication operation
A.A. Moldovyan, N.A. Moldovyan
doaj  

Improving Physically Unclonable Functions’ Performance Using Second-Order Compensated Measurement

open access: yesInformation
In this paper, we study the performance of second-order compensated measurement to generate a multi-bit response in physically unclonable functions (PUFs).
Jorge Fernández-Aragón   +5 more
doaj   +1 more source

ArtEM: Enhancing the Understanding of Integer and Modular Arithmetic Through Interactive Learning Software

open access: yesComputer Applications in Engineering Education, Volume 33, Issue 4, July 2025.
ABSTRACT Integer and modular arithmetic is a fundamental area of mathematics, with extensive applications in computer science, and is essential for cryptographic protocols, error correction, and algorithm efficiency. However, students often struggle to understand its abstract nature, especially when transitioning from theoretical knowledge to practical
Violeta Migallón   +2 more
wiley   +1 more source

Efficient Length Doubling From Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2017
We present a length doubler, LDT, that turns an n-bit tweakable block cipher into an efficient and secure cipher that can encrypt any bit string of length [n..2n − 1].
Yu Long Chen   +3 more
doaj   +1 more source

Institutional Environment and the Use of Blockchain Technology: Exploring the Context and Conditions of Using Blockchain in the Higher Education Institutions

open access: yesHigher Education Quarterly, Volume 79, Issue 3, July 2025.
ABSTRACT Blockchain (BC) technology is widely believed to be the next disruptive technology that can address challenges in higher education institutions (HEIs) and support resilient strategies. This study aims to contribute to the literature and inform policymakers about BC's capability and potential in HE by examining enablers, barriers and contextual
Buddhi Pathak   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy