Results 71 to 80 of about 5,022 (206)
To achieve source authentication, message integrity, and non-repudiation, a number of authentication protocols adopt several types of digital signatures: public-key signatures, identity-based signatures, and certificateless signatures.
Kyung-Ah Shim
doaj +1 more source
Miners' Reward Elasticity and Stability of Competing Proof‐of‐Work Cryptocurrencies
ABSTRACT Proof‐of‐Work cryptocurrencies employ miners to sustain the system through algorithmic reward adjustments. We develop a stochastic model of the multicurrency mining and identify conditions for stable transaction speeds. Bitcoin's algorithm requires hash supply elasticity <$<$1 for stability, while ASERT remains stable for any elasticity and ...
Kohei Kawaguchi +2 more
wiley +1 more source
In the content-centric networking (CCN), the content transmitted between data owners, consumers, and the servers is confidential to its publishers.
Shahriar Badsha +3 more
doaj +1 more source
Digital Identity Wallets: A Guide to the EU’s New Identity Model
ABSTRACT By 2026, the European Union will introduce digital identity wallets to its citizens, residents, and organisations. These wallets will have far‐reaching implications for how public and private sector organisations interact with their users—some evident, others less.
Andre Kudra +5 more
wiley +1 more source
This paper addresses security challenges, especially in the authentication mechanism of Industrial Internet of Things (IIoT)-enabled supply chain systems by proposing an enhanced Radio Frequency Identification (RFID) authentication protocol.
Vikash Kumar, Santosh Kumar Das
doaj +1 more source
Coalition Formation for Sustainable Blockchain Governance: Insights From the Hedera Case
ABSTRACT Sustainable governance is essential for blockchain networks to achieve widespread adoption and deliver long‐term business value. Prior blockchain initiatives indicate that inadequate governance structures often lead to limited adoption or eventual project failure, underscoring the importance of decentralised governance for building resilient ...
Christophe Viguerie, Horst Treiblmaier
wiley +1 more source
Abstract This essay argues that social media document (rather than fuel) the decline of political democracy while helping revive organizational democracy, including through ‘decentralized autonomous organizations’ (DAOs). Yet, despite giving everyone a voice and the ability to organize across borders, social media could over‐concentrate power if, in ...
J.P. Vergne
wiley +1 more source
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang +3 more
wiley +1 more source
Opportunities and challenges in protein structure prediction
Abstract Deep learning methods, particularly exemplified by AlphaFold2, have revolutionized the field of protein structure prediction—an achievement recognized by the 2024 Nobel Prize in Chemistry awarded to its core developers. Despite this remarkable achievement, the broader protein folding problem is far from solved. Key challenges—each representing
Wenkai Wang +3 more
wiley +1 more source
Blockchain for the Arts and Humanities
ABSTRACT As born‐digital cultural materials proliferate, the arts and humanities require infrastructures that guarantee provenance, authenticity, and equitable access. This paper delivers a comprehensive, critical survey of blockchain's potential and limits across the sector.
James O'Sullivan
wiley +1 more source

