Results 121 to 130 of about 1,901,421 (313)
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo +3 more
wiley +1 more source
Secure Composition of Cryptographic Protocols [PDF]
General positive results for secure computation were obtained more than two decades ago. These results were for the setting where each protocol execution is done in isolation. With the proliferation of the network setting (and especially the internet), an ambitious effort to generalize these results and obtain concurrently secure protocols was started.
openaire +3 more sources
The Network State, Exit, and the Political Economy of Venture Capital
Abstract This article focuses on the Network State movement as embodying the venture capital (VC) logic of exit. Exit constitutes both a strategy for lucrative returns and an ideology seeking out new territories for financial and technological speculation.
Olivier Jutel
wiley +1 more source
Current application of blockchain technology in healthcare and its potential roles in Urology
Objective To assess the current uses of blockchain technology in surgery and explore potential applications in urology. Methods A systematic literature review and critical appraisal was performed. The PubMed database was searched for all relevant papers published in English, between 2003 and 2023, on blockchain and surgery, and urology.
Sulleyman Felemban +6 more
wiley +1 more source
On the properties of cryptographic protocols and the weaknesses of the BAN-like logics [PDF]
Shouhuai Xu, Gendu Zhang, Hong Zhu
openalex +1 more source
An Economic Analysis of Difficulty Adjustment Algorithms in Proof‐of‐Work Blockchain Systems
ABSTRACT We study the stability of cryptocurrency systems through difficulty adjustment. Bitcoin's difficulty adjustment algorithm (DAA) exhibits instability when the reward elasticity of the hash rate is high, implying that a sharp price reduction could disrupt the current Bitcoin system.
Shunya Noda +2 more
wiley +1 more source
Digital Identity Wallets: A Guide to the EU’s New Identity Model
ABSTRACT By 2026, the European Union will introduce digital identity wallets to its citizens, residents, and organisations. These wallets will have far‐reaching implications for how public and private sector organisations interact with their users—some evident, others less.
Andre Kudra +5 more
wiley +1 more source
Security and Composition of Multiparty Cryptographic Protocols [PDF]
Ran Canetti
openalex +1 more source
ABSTRACT Growing financial needs for a sustainable transition have led to the development of green finance and citizen‐led monetary innovations. These initiatives recognized the necessity of developing new forms of money regarding the environmental crisis, referred to as environmental complementary currency (ECCs).
Léo Revelli
wiley +1 more source
Entangled State Quantum Cryptography: Eavesdropping on the Ekert Protocol [PDF]
Devang Naik +4 more
openalex +1 more source

