Results 111 to 120 of about 1,801,560 (284)
ABSTRACT Integer and modular arithmetic is a fundamental area of mathematics, with extensive applications in computer science, and is essential for cryptographic protocols, error correction, and algorithm efficiency. However, students often struggle to understand its abstract nature, especially when transitioning from theoretical knowledge to practical
Violeta Migallón+2 more
wiley +1 more source
This study implements the Industrial Internet of Things (IIoT) in TIG welding to enhance process monitoring and control for SS304 stainless steel. Key findings reveal improved weld quality through real‐time tracking of current, speed, gas flow, and arc gap.
Mukhtar Sama+3 more
wiley +1 more source
Blockweave: An Arweave‐Based Decentralized Storage Solution to Tackle the Blockchain Trilemma
Leveraging Arweave's blockweave and Proof‐of‐Access consensus, this framework reduces on‐chain metadata to 48 bytes, enabling throughput up to 7200 TPS, 99%$$ 99\% $$ storage savings, and robust security (Q(0.4)=0.82)$$ \left(\mathrm{Q}(0.4)=0.82\right) $$ while achieving Tier‐S decentralization on $300 mining nodes.
Saha Reno, Koushik Roy, Tamanna Tabassum
wiley +1 more source
Russian Cryptographic Algorithms in the Identity Management Systems
The subject of the research is to implement Russian cryptographic algorithms in the IdM-systems. The research centers on the study of the claim-based authentication protocols and the existing IdM-systems and on the development of an authentication module
A.V. Dubovitskaya, P. V. Smirnov
doaj
A research on cross‐chain and interoperation methods of fusion protocol
At present, cross‐chain technology and cross‐chain system pay more attention to cross‐chain security and performance, and have shown great improvement in security, scalability and efficiency. However, the generality of cross‐chain technology in different
Li Ming+4 more
doaj +1 more source
Communicating tokenomics and monetary policy: A comparative analysis of real and virtual economies
Abstract This article investigates the economic governance of blockchain‐based virtual economies in the context of monetary policy. Focusing on tokenomics communication, we employ deductive and inductive approaches, applying real‐world monetary policy metrics and text mining frameworks. Our comparative analysis reveals that the tokenomics communication
Kane Falco ter Veer, Timo Heinrich
wiley +1 more source
Blockchain and NoSQL: Enhancing Throughput via a Deep Learning‐Based Hybrid Architecture
ABSTRACT Any data structure used to store information can be considered a database. Blockchain technology, at its core, is no more than a ledger to store information about transactions. In recent years, such technology has gained immense popularity in a wide range of applications.
Longo Antonello+4 more
wiley +1 more source
Client Trustworthiness within Internet-banking Application Using Removable Key Carriers
In this paper author describes the possibility of using removable key carriers within Internet-banking systems.
Sergey Sergeevich Agafyin
doaj
Entangled State Quantum Cryptography: Eavesdropping on the Ekert Protocol [PDF]
Devang Naik+4 more
openalex +1 more source
QuantumNetSec: Quantum Machine Learning for Network Security
ABSTRACT As the digital landscape becomes increasingly complex, traditional cybersecurity measures are struggling to keep pace with the growing sophistication of cyber threats. This escalating challenge calls for new, more robust solutions. In this context, quantum computing emerges as a powerful tool that can change our approach to network security ...
Diego Abreu+3 more
wiley +1 more source