Results 81 to 90 of about 380,993 (266)

Singapore upon the Korea Strait? Cyberlibertarian Desires and Anxious Regulation in Busan's Blockchain Regulation Free Zone

open access: yesAntipode, Volume 57, Issue 5, Page 1892-1913, September 2025.
Abstract This article examines the intersection of Asia's blockchain industry and special economic zones (SEZs). SEZs have been promoted to localise blockchain technology by disparate actors from cyberlibertarian figures to Asian blockchain firms, national policymakers, and local politicians.
Jamie Doucette, Seung‐Ook Lee
wiley   +1 more source

THE TABULAR OF CRYPTOGRAPHIC PRIMITIVES OF NONLINEAR SUBSTITUTIONS

open access: yesÌнформаційні технології в освіті, 2015
Classic primitives nonlinear substitution is a simple replacing each character encrypted text on a fixed symbol of the same alphabet, actually realizing the transformation one alphabet simple substitution cipher. And as a consequence - the entropy cipher
A. Beletsky
doaj  

Quantum Computing: Foundations, Architecture and Applications

open access: yesEngineering Reports, Volume 7, Issue 8, August 2025.
This paper presents a study on quantum computing's theoretical foundations and applications, illustrated by a quantum circuit diagram featuring gates and measurements that demonstrate qubit manipulation and entanglement. ABSTRACT Quantum computing exploits the principles of quantum mechanics to address computational problems that are intractable to ...
Christopher Columbus Chinnappan   +4 more
wiley   +1 more source

Security in Metaverse Markets: Challenges and Solutions—A Comprehensive Review

open access: yesExpert Systems, Volume 42, Issue 8, August 2025.
ABSTRACT This review paper provides a systematic overview of the metaverse markets security problems and solutions. The metaverse is an emerging digital space, bridging virtual, augmented and mixed reality environments. As the metaverse evolves, issues related to customer security have emerged, which include breaches of privacy, thefts of identity and ...
Mohammad Z. Aloudat   +3 more
wiley   +1 more source

A Novel Identity-Based Signcryption Scheme in the Standard Model

open access: yesInformation, 2017
Identity-based signcryption is a useful cryptographic primitive that provides both authentication and confidentiality for identity-based crypto systems. It is challenging to build a secure identity-based signcryption scheme that can be proven secure in a
Yueying Huang, Junjie Yang
doaj   +1 more source

Block encryption of quantum messages [PDF]

open access: yes, 2018
In modern cryptography, block encryption is a fundamental cryptographic primitive. However, it is impossible for block encryption to achieve the same security as one-time pad.
Liang, Min, Yang, Li
core   +1 more source

ArtEM: Enhancing the Understanding of Integer and Modular Arithmetic Through Interactive Learning Software

open access: yesComputer Applications in Engineering Education, Volume 33, Issue 4, July 2025.
ABSTRACT Integer and modular arithmetic is a fundamental area of mathematics, with extensive applications in computer science, and is essential for cryptographic protocols, error correction, and algorithm efficiency. However, students often struggle to understand its abstract nature, especially when transitioning from theoretical knowledge to practical
Violeta Migallón   +2 more
wiley   +1 more source

Institutional Environment and the Use of Blockchain Technology: Exploring the Context and Conditions of Using Blockchain in the Higher Education Institutions

open access: yesHigher Education Quarterly, Volume 79, Issue 3, July 2025.
ABSTRACT Blockchain (BC) technology is widely believed to be the next disruptive technology that can address challenges in higher education institutions (HEIs) and support resilient strategies. This study aims to contribute to the literature and inform policymakers about BC's capability and potential in HE by examining enablers, barriers and contextual
Buddhi Pathak   +2 more
wiley   +1 more source

Adaptable Cryptographic Primitives in Blockchains via Smart Contracts [PDF]

open access: gold, 2022
Riccardo Longo   +4 more
openalex   +1 more source

How to Govern the Confidence Machine?

open access: yesRegulation &Governance, Volume 19, Issue 3, Page 706-721, July 2025.
ABSTRACT Emerging technologies pose many new challenges for regulation and governance on a global scale. With the advent of distributed communication networks like the Internet and decentralized ledger technologies like blockchain, new platforms emerged, disrupting existing power dynamics and bringing about new claims of sovereignty from the private ...
Primavera de Filippi   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy