Results 101 to 110 of about 7,441 (248)

Can Complementary Currencies Foster Sustainability? A Systematic Review of the Impacts of Environmental Complementary Currencies

open access: yesJournal of Economic Surveys, Volume 40, Issue 1, Page 549-581, February 2026.
ABSTRACT Growing financial needs for a sustainable transition have led to the development of green finance and citizen‐led monetary innovations. These initiatives recognized the necessity of developing new forms of money regarding the environmental crisis, referred to as environmental complementary currency (ECCs).
Léo Revelli
wiley   +1 more source

A Review of Lightweight IoT Authentication Protocols From the Perspective of Security Requirements, Computation, Communication, and Hardware Costs

open access: yesIEEE Access
The Internet of Things (IoT) is a broad area that encompasses various use cases. Numerous use cases include various IoT devices, which necessitate various cryptographic methods to provide distinct security requirements.
Isil Cetintav, Mehmet Tahir Sandikkaya
doaj   +1 more source

Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms

open access: yesScientific Reports
This research introduces a novel hybrid cryptographic framework that combines traditional cryptographic protocols with advanced methodologies, specifically Wasserstein Generative Adversarial Networks with Gradient Penalty (WGAN-GP) and Genetic Algorithms
Purushottam Singh   +2 more
doaj   +1 more source

Enhancing the SRAM PUF with an XOR Gate

open access: yesApplied Sciences
This study focuses on designing enhanced Physically Unclonable Functions (PUFs) based on SRAM devices and improving the security of cryptographic systems.
Jack Garrard   +2 more
doaj   +1 more source

vulnerability Analysis Techniques of Hardware and Software Implementations of Cryptographic Algorithms

open access: yesБезопасность информационных технологий, 2014
The article is a brief survey of hardware vulnerability analysis methods that might be applicable against cryptographic algorithm implementations. Those methods are based on physical properties of a device processing the algorithm.
Roman Gevorkovich Korkikian   +2 more
doaj  

Efficient anonymous authentication protocol for internet of vehicles based on Chinese cryptographic SM2

open access: yes网络与信息安全学报
A critical component of cybersecurity protection in the internet of vehicles (IoV) was identity authentication. However, many existing authentication schemes were plagued by low efficiency and incompatibility with domestic cryptographic algorithms.
SU Binting, FANG He, XU Li
doaj  

Home - About - Disclaimer - Privacy