Agents' Behavior and Interest Rate Model Optimization in DeFi Lending
ABSTRACT Contrasting sharply with traditional money, bond, and bond futures markets, where interest rates emerge organically from participant interactions, DeFi lending platforms employ rule‐based interest rates that are algorithmically set. Thus, the selection of an effective interest rate model (IRM) is paramount for the success of a lending protocol.
Charles Bertucci +4 more
wiley +1 more source
Rethinking Blockchain and Power Dynamics in Supply Chains: A Critical Discourse Analysis
ABSTRACT Despite a generally positive discourse on blockchain technology in academic literature, firms have struggled to implement it in their supply chains. In this article, we are deconstructing the typically positive perception of blockchain in the literature through a provocative style of theorizing and critical discourse analysis.
Lara Schilling +2 more
wiley +1 more source
Quantum private query: A new kind of practical quantum cryptographic protocol
F. Gao, S. Qin, Wei Huang, Q. Wen
semanticscholar +1 more source
Securing End‐To‐End Encrypted File Sharing Services With the Messaging Layer Security Protocol
ABSTRACT Secure file sharing is essential in today's digital environment, yet many systems remain vulnerable: if an attacker steals client keys, they can often decrypt both past and future content. To address this challenge, we propose a novel file‐sharing architecture that strengthens post‐compromise security while remaining practical.
Roland Helmich, Lars Braubach
wiley +1 more source
Security Mechanisms and Access Control Infrastructure for Biometrics Passport using Cryptographic Protocols [PDF]
Vineet Kumar +1 more
openalex +1 more source
Temporal Dynamics Makes Memristive Physical Unclonable Functions More Secure and Ultra‐Lightweight
A temporal PUF (TPUF) is reported, using the randomness of temporal dynamics of memristors as an entropy source. By exploiting temporal complexity, significant reduction of hardware overhead is achieved in the TPUF, from otherwise at least hundreds‐of‐memristors‐scale crossbar arrays to only a pair of memristors.
Yunpeng Guo, Cheng Ma, Huanglong Li
wiley +1 more source
Toward efficient quantum computation of molecular ground‐state energies
Abstract Variational quantum eigensolvers (VQEs) represent a promising approach to computing molecular ground states and energies on modern quantum computers. These approaches use a classical computer to optimize the parameters of a trial wave function, while the quantum computer simulates the energy by preparing and measuring a set of bitstring ...
Farshud Sorourifar +8 more
wiley +1 more source
The Internet of Things (IoT) is a broad area that encompasses various use cases. Numerous use cases include various IoT devices, which necessitate various cryptographic methods to provide distinct security requirements.
Isil Cetintav, Mehmet Tahir Sandikkaya
doaj +1 more source
Automated Verification of Equivalence on Quantum Cryptographic Protocols
Takahiro Kubota +4 more
openalex +2 more sources
An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP [PDF]
Alaauldin Ibrahim, Gökhan Dalkılıç
openalex +1 more source

