Results 101 to 110 of about 1,801,560 (284)

Secure Composition of Cryptographic Protocols [PDF]

open access: yes, 2011
General positive results for secure computation were obtained more than two decades ago. These results were for the setting where each protocol execution is done in isolation. With the proliferation of the network setting (and especially the internet), an ambitious effort to generalize these results and obtain concurrently secure protocols was started.
openaire   +3 more sources

Corporate Governance in a Crypto‐World

open access: yesRegulation &Governance, EarlyView.
ABSTRACT This paper explores the nature of governance both within and by blockchains and the economies they support. There is a widespread assumption that the proper governance model for these economies is political. In this paper, I make an alternative claim, namely that a more accurate model for blockchain governance is as a species of corporate ...
Sinclair Davidson
wiley   +1 more source

How to Govern the Confidence Machine?

open access: yesRegulation &Governance, EarlyView.
ABSTRACT Emerging technologies pose many new challenges for regulation and governance on a global scale. With the advent of distributed communication networks like the Internet and decentralized ledger technologies like blockchain, new platforms emerged, disrupting existing power dynamics and bringing about new claims of sovereignty from the private ...
Primavera de Filippi   +2 more
wiley   +1 more source

Multi-language oriented automatic realization method for cryptographic protocols

open access: yesTongxin xuebao, 2012
A multi-objective-language-oriented automatic code generation scheme for security protocols was put forward.First,based on XML,a description method for security protocols was designed.Second,a graphic user interface(GUI)was developed,through which the ...
Xing-hua LI   +3 more
doaj   +2 more sources

The medium is the message: The geographies of cryptocurrency remittances to Venezuela

open access: yesTransactions of the Institute of British Geographers, EarlyView.
Short Abstract Cryptocurrency remittances overcome many regulatory and practical barriers, but there is little empirical research into this increasingly popular remittance medium. In response, this article explores cryptocurrency remittances from Latin America and the Caribbean into Venezuela.
Daniel Robins
wiley   +1 more source

A Real-Time Performance Analysis Model for Cryptographic Protocols [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2012
Several encryption algorithms exist today for securing data in storage and transmission over network systems. The choice of encryption algorithms must weigh performance requirements against the call for protection of sensitive data.
Amos Olagunju, Jake Soenneker
doaj  

Security in Metaverse Markets: Challenges and Solutions—A Comprehensive Review

open access: yesExpert Systems, Volume 42, Issue 8, August 2025.
ABSTRACT This review paper provides a systematic overview of the metaverse markets security problems and solutions. The metaverse is an emerging digital space, bridging virtual, augmented and mixed reality environments. As the metaverse evolves, issues related to customer security have emerged, which include breaches of privacy, thefts of identity and ...
Mohammad Z. Aloudat   +3 more
wiley   +1 more source

Self‐Assembled Physical Unclonable Function Labels Based on Plasmonic Coupling

open access: yesAdvanced Optical Materials, Volume 13, Issue 19, July 4, 2025.
This article introduces advanced anti‐counterfeit labels crafted through DNA‐guided self‐assembly of plasmonic nanoparticles. Utilizing nanosphere lithography for dense and precise nanoparticle placement, these labels feature unique, unclonable optical signatures achieved through plasmonic coupling, detectable by an economical 3D‐printed dark field ...
Mihir Dass   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy