Results 111 to 120 of about 1,801,560 (284)

ArtEM: Enhancing the Understanding of Integer and Modular Arithmetic Through Interactive Learning Software

open access: yesComputer Applications in Engineering Education, Volume 33, Issue 4, July 2025.
ABSTRACT Integer and modular arithmetic is a fundamental area of mathematics, with extensive applications in computer science, and is essential for cryptographic protocols, error correction, and algorithm efficiency. However, students often struggle to understand its abstract nature, especially when transitioning from theoretical knowledge to practical
Violeta Migallón   +2 more
wiley   +1 more source

Smart Manufacturing With Industrial Internet of Things: Advances in TIG Welding for SS304 Stainless Steel

open access: yesEngineering Reports, Volume 7, Issue 7, July 2025.
This study implements the Industrial Internet of Things (IIoT) in TIG welding to enhance process monitoring and control for SS304 stainless steel. Key findings reveal improved weld quality through real‐time tracking of current, speed, gas flow, and arc gap.
Mukhtar Sama   +3 more
wiley   +1 more source

Blockweave: An Arweave‐Based Decentralized Storage Solution to Tackle the Blockchain Trilemma

open access: yesEngineering Reports, Volume 7, Issue 7, July 2025.
Leveraging Arweave's blockweave and Proof‐of‐Access consensus, this framework reduces on‐chain metadata to 48 bytes, enabling throughput up to 7200 TPS, 99%$$ 99\% $$ storage savings, and robust security (Q(0.4)=0.82)$$ \left(\mathrm{Q}(0.4)=0.82\right) $$ while achieving Tier‐S decentralization on $300 mining nodes.
Saha Reno, Koushik Roy, Tamanna Tabassum
wiley   +1 more source

Russian Cryptographic Algorithms in the Identity Management Systems

open access: yesБезопасность информационных технологий, 2011
The subject of the research is to implement Russian cryptographic algorithms in the IdM-systems. The research centers on the study of the claim-based authentication protocols and the existing IdM-systems and on the development of an authentication module
A.V. Dubovitskaya, P. V. Smirnov
doaj  

A research on cross‐chain and interoperation methods of fusion protocol

open access: yesIET Blockchain
At present, cross‐chain technology and cross‐chain system pay more attention to cross‐chain security and performance, and have shown great improvement in security, scalability and efficiency. However, the generality of cross‐chain technology in different
Li Ming   +4 more
doaj   +1 more source

Communicating tokenomics and monetary policy: A comparative analysis of real and virtual economies

open access: yesInternational Journal of Finance &Economics, Volume 30, Issue 3, Page 2849-2866, July 2025.
Abstract This article investigates the economic governance of blockchain‐based virtual economies in the context of monetary policy. Focusing on tokenomics communication, we employ deductive and inductive approaches, applying real‐world monetary policy metrics and text mining frameworks. Our comparative analysis reveals that the tokenomics communication
Kane Falco ter Veer, Timo Heinrich
wiley   +1 more source

Blockchain and NoSQL: Enhancing Throughput via a Deep Learning‐Based Hybrid Architecture

open access: yesInternet Technology Letters, Volume 8, Issue 4, July/August 2025.
ABSTRACT Any data structure used to store information can be considered a database. Blockchain technology, at its core, is no more than a ledger to store information about transactions. In recent years, such technology has gained immense popularity in a wide range of applications.
Longo Antonello   +4 more
wiley   +1 more source

Client Trustworthiness within Internet-banking Application Using Removable Key Carriers

open access: yesБезопасность информационных технологий, 2013
In this paper author describes the possibility of using removable key carriers within Internet-banking systems.
Sergey Sergeevich Agafyin
doaj  

Entangled State Quantum Cryptography: Eavesdropping on the Ekert Protocol [PDF]

open access: green, 2000
Devang Naik   +4 more
openalex   +1 more source

QuantumNetSec: Quantum Machine Learning for Network Security

open access: yesInternational Journal of Network Management, Volume 35, Issue 4, July/August 2025.
ABSTRACT As the digital landscape becomes increasingly complex, traditional cybersecurity measures are struggling to keep pace with the growing sophistication of cyber threats. This escalating challenge calls for new, more robust solutions. In this context, quantum computing emerges as a powerful tool that can change our approach to network security ...
Diego Abreu   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy