Results 71 to 80 of about 6,594 (201)

Corporate Governance in a Crypto‐World

open access: yesRegulation &Governance, EarlyView.
ABSTRACT This paper explores the nature of governance both within and by blockchains and the economies they support. There is a widespread assumption that the proper governance model for these economies is political. In this paper, I make an alternative claim, namely that a more accurate model for blockchain governance is as a species of corporate ...
Sinclair Davidson
wiley   +1 more source

Enhancing TLS Handshake Security: A Novel Mutual Cryptographic Scheme

open access: yesTehnički Vjesnik
The Transport Layer Security (TLS) Handshake Protocol serves as a critical mechanism in the security framework of internet communications, establishing a secure conduit between clients and servers.
Yuting Feng
doaj   +1 more source

Ridra: A Rigorous Decentralized Randomized Authentication in VANETs

open access: yesIEEE Access, 2018
Ensuring the security and privacy of vehicle is one of the critical requirements for the safety and reliability of vehicular ad hoc networks. A variety of (conditional) anonymous authentication schemes, including group/ring signatures, pseudo-identity ...
Cong Sun   +4 more
doaj   +1 more source

How to Govern the Confidence Machine?

open access: yesRegulation &Governance, EarlyView.
ABSTRACT Emerging technologies pose many new challenges for regulation and governance on a global scale. With the advent of distributed communication networks like the Internet and decentralized ledger technologies like blockchain, new platforms emerged, disrupting existing power dynamics and bringing about new claims of sovereignty from the private ...
Primavera de Filippi   +2 more
wiley   +1 more source

The medium is the message: The geographies of cryptocurrency remittances to Venezuela

open access: yesTransactions of the Institute of British Geographers, EarlyView.
Short Abstract Cryptocurrency remittances overcome many regulatory and practical barriers, but there is little empirical research into this increasingly popular remittance medium. In response, this article explores cryptocurrency remittances from Latin America and the Caribbean into Venezuela.
Daniel Robins
wiley   +1 more source

ArtEM: Enhancing the Understanding of Integer and Modular Arithmetic Through Interactive Learning Software

open access: yesComputer Applications in Engineering Education, Volume 33, Issue 4, July 2025.
ABSTRACT Integer and modular arithmetic is a fundamental area of mathematics, with extensive applications in computer science, and is essential for cryptographic protocols, error correction, and algorithm efficiency. However, students often struggle to understand its abstract nature, especially when transitioning from theoretical knowledge to practical
Violeta Migallón   +2 more
wiley   +1 more source

Communicating tokenomics and monetary policy: A comparative analysis of real and virtual economies

open access: yesInternational Journal of Finance &Economics, Volume 30, Issue 3, Page 2849-2866, July 2025.
Abstract This article investigates the economic governance of blockchain‐based virtual economies in the context of monetary policy. Focusing on tokenomics communication, we employ deductive and inductive approaches, applying real‐world monetary policy metrics and text mining frameworks. Our comparative analysis reveals that the tokenomics communication
Kane Falco ter Veer, Timo Heinrich
wiley   +1 more source

Blockchain and NoSQL: Enhancing Throughput via a Deep Learning‐Based Hybrid Architecture

open access: yesInternet Technology Letters, Volume 8, Issue 4, July/August 2025.
ABSTRACT Any data structure used to store information can be considered a database. Blockchain technology, at its core, is no more than a ledger to store information about transactions. In recent years, such technology has gained immense popularity in a wide range of applications.
Longo Antonello   +4 more
wiley   +1 more source

A Review of Lightweight IoT Authentication Protocols From the Perspective of Security Requirements, Computation, Communication, and Hardware Costs

open access: yesIEEE Access
The Internet of Things (IoT) is a broad area that encompasses various use cases. Numerous use cases include various IoT devices, which necessitate various cryptographic methods to provide distinct security requirements.
Isil Cetintav, Mehmet Tahir Sandikkaya
doaj   +1 more source

Home - About - Disclaimer - Privacy