Results 61 to 70 of about 62,745 (179)

Verification of stateful cryptographic protocols with exclusive OR [PDF]

open access: yesJournal of Computer Security, 2019
In cryptographic protocols, in particular RFID protocols, exclusive-or (XOR) operations are common. Due to the inherent complexity of faithful models of XOR, there is only limited tool support for the verification of cryptographic protocols using XOR.
Dreier, Jannik   +3 more
openaire   +4 more sources

Functional and phylogenetic beta diversity response of nocturnal moth assemblages to land‐use intensity in grasslands and forests

open access: yesOikos, EarlyView.
Land‐use intensification is filtering for species, able to cope with anthropogenic landscapes. This was assumed to result in functionally and phylogenetically homogenous communities, but a recent meta‐analysis could not confirm a consistent homogenization response to human pressure and raises open questions.
Marcel Püls   +10 more
wiley   +1 more source

Statistical Complexity of Quantum Learning

open access: yesAdvanced Quantum Technologies, EarlyView.
The statistical performance of quantum learning is investigated as a function of the number of training data N$N$, and of the number of copies available for each quantum state in the training and testing data sets, respectively S$S$ and V$V$. Indeed, the biggest difference in quantum learning comes from the destructive nature of quantum measurements ...
Leonardo Banchi   +3 more
wiley   +1 more source

Open and Closed Loop Approaches for Energy Efficient Quantum Optimal Control

open access: yesAdvanced Quantum Technologies, EarlyView.
Concepts from quantum thermodynamics and optimal control are blended to derive a theoretical framework to quantify and minimize the energetic cost of a pulse for unitary synthesis. Two complementary techniques (based on GRAPE and Reinforce‐DRL) are implemented as open‐source software that co‐optimizes the fidelity and energetic cost within quantum ...
Sebastiaan Fauquenot   +2 more
wiley   +1 more source

Finding Safety in Numbers with Secure Allegation Escrows

open access: yes, 2019
For fear of retribution, the victim of a crime may be willing to report it only if other victims of the same perpetrator also step forward. Common examples include 1) identifying oneself as the victim of sexual harassment, especially by a person in a ...
Arun, Venkat   +4 more
core   +1 more source

Bridging the Gap: Achieving Seamless Interoperability Between Ethereum‐Based Blockchains Using Inter‐Blockchain Communication Protocols

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Introduction The popularization of blockchain‐based applications made evident a critical challenge, namely the inherent isolation of these decentralized systems, akin to the disconnected and technologically diverse local area networks of the 1970s. This lack of interoperability limits the potential for widespread adoption and innovation in the
Christian Delgado‐von‐Eitzen   +3 more
wiley   +1 more source

An optimistic fair e-commerce protocol for large e-goods [PDF]

open access: yes, 2006
Suppose two entities that do not trust each other want to exchange some arbitrary data over a public channel. A fair exchange protocol ensures that both parties get what they want or neither gets anything.
Levi, Albert   +4 more
core  

A Probabilistic Scheduler for the Analysis of Cryptographic Protocols

open access: yesElectronic Notes in Theoretical Computer Science, 2007
AbstractWhen modelling cryto-protocols by means of process calculi which express both nondeterministic and probabilistic behavior, it is customary to view the scheduler as an intruder. It has been established that the traditional scheduler needs to be carefully calibrated in order to more accurately reflect the intruder's capabilities for controlling ...
John Mullins   +2 more
openaire   +3 more sources

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy