Results 71 to 80 of about 5,022 (206)

Security Analysis of Various Authentication Schemes Based on Three Types of Digital Signature Schemes

open access: yesIEEE Access, 2018
To achieve source authentication, message integrity, and non-repudiation, a number of authentication protocols adopt several types of digital signatures: public-key signatures, identity-based signatures, and certificateless signatures.
Kyung-Ah Shim
doaj   +1 more source

Miners' Reward Elasticity and Stability of Competing Proof‐of‐Work Cryptocurrencies

open access: yesInternational Economic Review, EarlyView.
ABSTRACT Proof‐of‐Work cryptocurrencies employ miners to sustain the system through algorithmic reward adjustments. We develop a stochastic model of the multicurrency mining and identify conditions for stable transaction speeds. Bitcoin's algorithm requires hash supply elasticity <$<$1 for stability, while ASERT remains stable for any elasticity and ...
Kohei Kawaguchi   +2 more
wiley   +1 more source

Designing Privacy-Preserving Protocols for Content Sharing and Aggregation in Content Centric Networking

open access: yesIEEE Access, 2018
In the content-centric networking (CCN), the content transmitted between data owners, consumers, and the servers is confidential to its publishers.
Shahriar Badsha   +3 more
doaj   +1 more source

Digital Identity Wallets: A Guide to the EU’s New Identity Model

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT By 2026, the European Union will introduce digital identity wallets to its citizens, residents, and organisations. These wallets will have far‐reaching implications for how public and private sector organisations interact with their users—some evident, others less.
Andre Kudra   +5 more
wiley   +1 more source

Enhancing security in IIoT: RFID authentication protocol for edge computing and blockchain-enabled supply chain

open access: yesCyber Security and Applications
This paper addresses security challenges, especially in the authentication mechanism of Industrial Internet of Things (IIoT)-enabled supply chain systems by proposing an enhanced Radio Frequency Identification (RFID) authentication protocol.
Vikash Kumar, Santosh Kumar Das
doaj   +1 more source

Coalition Formation for Sustainable Blockchain Governance: Insights From the Hedera Case

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT Sustainable governance is essential for blockchain networks to achieve widespread adoption and deliver long‐term business value. Prior blockchain initiatives indicate that inadequate governance structures often lead to limited adoption or eventual project failure, underscoring the importance of decentralised governance for building resilient ...
Christophe Viguerie, Horst Treiblmaier
wiley   +1 more source

Make Social Media Social Again: How Platform Interoperability Can Fix Social Media and Future‐Proof Democracy

open access: yesJournal of Management Studies, EarlyView.
Abstract This essay argues that social media document (rather than fuel) the decline of political democracy while helping revive organizational democracy, including through ‘decentralized autonomous organizations’ (DAOs). Yet, despite giving everyone a voice and the ability to organize across borders, social media could over‐concentrate power if, in ...
J.P. Vergne
wiley   +1 more source

A Survey for Deep Reinforcement Learning Based Network Intrusion Detection

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang   +3 more
wiley   +1 more source

Opportunities and challenges in protein structure prediction

open access: yesQuantitative Biology, Volume 14, Issue 2, June 2026.
Abstract Deep learning methods, particularly exemplified by AlphaFold2, have revolutionized the field of protein structure prediction—an achievement recognized by the 2024 Nobel Prize in Chemistry awarded to its core developers. Despite this remarkable achievement, the broader protein folding problem is far from solved. Key challenges—each representing
Wenkai Wang   +3 more
wiley   +1 more source

Blockchain for the Arts and Humanities

open access: yesFuture Humanities, Volume 4, Issue 1, May 2026.
ABSTRACT As born‐digital cultural materials proliferate, the arts and humanities require infrastructures that guarantee provenance, authenticity, and equitable access. This paper delivers a comprehensive, critical survey of blockchain's potential and limits across the sector.
James O'Sullivan
wiley   +1 more source

Home - About - Disclaimer - Privacy