Results 111 to 120 of about 1,926,564 (269)

Agents' Behavior and Interest Rate Model Optimization in DeFi Lending

open access: yesMathematical Finance, EarlyView.
ABSTRACT Contrasting sharply with traditional money, bond, and bond futures markets, where interest rates emerge organically from participant interactions, DeFi lending platforms employ rule‐based interest rates that are algorithmically set. Thus, the selection of an effective interest rate model (IRM) is paramount for the success of a lending protocol.
Charles Bertucci   +4 more
wiley   +1 more source

Rethinking Blockchain and Power Dynamics in Supply Chains: A Critical Discourse Analysis

open access: yesJournal of Business Logistics, Volume 47, Issue 1, January 2026.
ABSTRACT Despite a generally positive discourse on blockchain technology in academic literature, firms have struggled to implement it in their supply chains. In this article, we are deconstructing the typically positive perception of blockchain in the literature through a provocative style of theorizing and critical discourse analysis.
Lara Schilling   +2 more
wiley   +1 more source

Quantum private query: A new kind of practical quantum cryptographic protocol

open access: yesScience China Physics Mechanics and Astronomy, 2019
F. Gao, S. Qin, Wei Huang, Q. Wen
semanticscholar   +1 more source

Securing End‐To‐End Encrypted File Sharing Services With the Messaging Layer Security Protocol

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 27-28, 25 December 2025.
ABSTRACT Secure file sharing is essential in today's digital environment, yet many systems remain vulnerable: if an attacker steals client keys, they can often decrypt both past and future content. To address this challenge, we propose a novel file‐sharing architecture that strengthens post‐compromise security while remaining practical.
Roland Helmich, Lars Braubach
wiley   +1 more source

Temporal Dynamics Makes Memristive Physical Unclonable Functions More Secure and Ultra‐Lightweight

open access: yesAdvanced Electronic Materials, Volume 11, Issue 20, December 3, 2025.
A temporal PUF (TPUF) is reported, using the randomness of temporal dynamics of memristors as an entropy source. By exploiting temporal complexity, significant reduction of hardware overhead is achieved in the TPUF, from otherwise at least hundreds‐of‐memristors‐scale crossbar arrays to only a pair of memristors.
Yunpeng Guo, Cheng Ma, Huanglong Li
wiley   +1 more source

Toward efficient quantum computation of molecular ground‐state energies

open access: yesAIChE Journal, Volume 71, Issue 12, December 2025.
Abstract Variational quantum eigensolvers (VQEs) represent a promising approach to computing molecular ground states and energies on modern quantum computers. These approaches use a classical computer to optimize the parameters of a trial wave function, while the quantum computer simulates the energy by preparing and measuring a set of bitstring ...
Farshud Sorourifar   +8 more
wiley   +1 more source

A Review of Lightweight IoT Authentication Protocols From the Perspective of Security Requirements, Computation, Communication, and Hardware Costs

open access: yesIEEE Access
The Internet of Things (IoT) is a broad area that encompasses various use cases. Numerous use cases include various IoT devices, which necessitate various cryptographic methods to provide distinct security requirements.
Isil Cetintav, Mehmet Tahir Sandikkaya
doaj   +1 more source

Automated Verification of Equivalence on Quantum Cryptographic Protocols

open access: bronze, 2018
Takahiro Kubota   +4 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy