Results 81 to 90 of about 62,745 (179)

Secure Composition of Cryptographic Protocols [PDF]

open access: yes, 2011
General positive results for secure computation were obtained more than two decades ago. These results were for the setting where each protocol execution is done in isolation. With the proliferation of the network setting (and especially the internet), an ambitious effort to generalize these results and obtain concurrently secure protocols was started.
openaire   +3 more sources

The medium is the message: The geographies of cryptocurrency remittances to Venezuela

open access: yesTransactions of the Institute of British Geographers, EarlyView.
Short Abstract Cryptocurrency remittances overcome many regulatory and practical barriers, but there is little empirical research into this increasingly popular remittance medium. In response, this article explores cryptocurrency remittances from Latin America and the Caribbean into Venezuela.
Daniel Robins
wiley   +1 more source

pTx‐Pulseq in hybrid sequences: Accessible and advanced hybrid open‐source MRI sequences on Philips scanners

open access: yesMagnetic Resonance in Medicine, Volume 94, Issue 5, Page 1946-1962, November 2025.
Abstract Purpose To enhance the accessibility of advanced pulse sequences, or parts thereof, through the open‐source Pulseq framework. This work extends the Pulseq framework to Philips MRI systems and incorporates dynamic parallel‐transmit (pTx) capabilities within the constraints of the existing Pulseq format.
Thomas H. M. Roos   +10 more
wiley   +1 more source

M‐SADR: Mobile Self Adaptive Data Rate for Enhanced LoRa End‐Device Connectivity on the Move

open access: yesInternational Journal of Communication Systems, Volume 38, Issue 15, October 2025.
The proposed M‐SADR method targets mobile LoRa end‐devices and achieves better performance, with a 2.4% improvement in packet delivery ratio and a 5.7% reduction in power consumption per successfully delivered packet. ABSTRACT Mobility is a critical aspect of the Internet of Things, reflecting the diverse and dynamic nature of potential applications ...
Vasileios Moysiadis   +6 more
wiley   +1 more source

A Comparative Analysis on the Services Offered by Amazon Web Services and Microsoft Azure

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 21-22, 25 September 2025.
ABSTRACT Different small or large‐scale enterprises came to the conclusion that moving data to the cloud is more convenient. In recent decades, AWS and Azure have tried their best to provide comparatively affordable and instant solutions. Both cloud platforms are extensive to understand, so it is difficult for users to make the right choice because of ...
Sara Hameed   +4 more
wiley   +1 more source

Automated Risk‐Based Cryptoperiod Calculation in ICSs: Analytical Framework and Software Tool

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 5, September/October 2025.
ABSTRACT Internal network and system reconnaissance is one of the first crucial stages of most cyber attacks, though it plays an especially important role in attacks on complex industrial control systems (ICSs) that span both IT and OT environments. Frequently, besides device enumeration and scanning, a malicious ICS reconnaissance campaign will also ...
Gabriele Cianfarani   +2 more
wiley   +1 more source

Blockchain‐Based Federated Learning Methodologies in Smart Environments for Drone Technology

open access: yesIEEJ Transactions on Electrical and Electronic Engineering, Volume 20, Issue 9, Page 1393-1404, September 2025.
High‐security transactions are stored in a chain of blocks using blockchain technology. Security and privacy concerns may be addressed by using blockchain technology. Federated learning is a paradigm for increasing data mining accuracy and precision by ensuring data privacy and security for both internet of things (IoT) devices and users in smart ...
Mukkoti Maruthi Venkata Chalapathi   +6 more
wiley   +1 more source

Quantum Computing in Industrial Internet of Things (IIoT) Forensics: Framework, Implications, Opportunities, and Future Directions

open access: yesWIREs Forensic Science, Volume 7, Issue 3, September 2025.
Generic Quantum‐Safe IIoT Forensics Framework (QS‐IIoT‐F) ABSTRACT The continuous evolution of quantum computing has shown novel and transformative possibilities and critical implications for the Industrial Internet of Things (IIoT) forensic processes.
Victor R. Kebande
wiley   +1 more source

Hardware Security in the Connected World

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 15, Issue 3, September 2025.
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee   +4 more
wiley   +1 more source

A Guide to Machine Learning Epistemic Ignorance, Hidden Paradoxes, and Other Tensions

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 15, Issue 3, September 2025.
ABSTRACT Machine learning (ML) has rapidly scaled in capacity and complexity, yet blind spots persist beneath its high performance façade. In order to shed more light on this argument, this paper presents a curated catalogue of 175 unconventional concepts, each capturing a paradox, tension, or overlooked risk in modern ML practice.
M. Z. Naser
wiley   +1 more source

Home - About - Disclaimer - Privacy