Results 91 to 100 of about 1,926,564 (269)
In the content-centric networking (CCN), the content transmitted between data owners, consumers, and the servers is confidential to its publishers.
Shahriar Badsha +3 more
doaj +1 more source
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam +9 more
wiley +1 more source
This paper addresses security challenges, especially in the authentication mechanism of Industrial Internet of Things (IIoT)-enabled supply chain systems by proposing an enhanced Radio Frequency Identification (RFID) authentication protocol.
Vikash Kumar, Santosh Kumar Das
doaj +1 more source
Modeling and Analysis of Advanced Cryptographic Primitives and Security Protocols in Maude-NPA [PDF]
Damián Aparicio Sánchez
openalex +1 more source
Forensic analysis and evaluation of file‐wiping applications in Android OS
Abstract Anti‐forensics refers to techniques designed to obstruct the discovery of evidence in digital forensic investigations. File‐wiping is one of the anti‐forensic techniques that make data recovery impossible by overwriting data with specific patterns. This technique poses significant challenges to investigators.
Dong Bin Oh +6 more
wiley +1 more source
A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley +1 more source
Development of Quantum Protocol Modification CSLOE–2022, Increasing the Cryptographic Strength of Classical Quantum Protocol BB84 [PDF]
Larissa V. Cherckesova +3 more
openalex +1 more source
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo +3 more
wiley +1 more source
The Network State, Exit, and the Political Economy of Venture Capital
Abstract This article focuses on the Network State movement as embodying the venture capital (VC) logic of exit. Exit constitutes both a strategy for lucrative returns and an ideology seeking out new territories for financial and technological speculation.
Olivier Jutel
wiley +1 more source

