Results 121 to 130 of about 1,801,560 (284)
A Simple and Efficient Approach to Verifying Cryptographic Protocols [PDF]
Yongxing Sun, Xinmei Wang
openalex +1 more source
Federated Learning Architectures: A Performance Evaluation With Crop Yield Prediction Application
ABSTRACT Introduction Federated learning has become an emerging technology in data analysis for IoT applications. Methods This paper implements centralized and decentralized federated learning frameworks for crop yield prediction based on Long Short‐Term Memory Network and Gated Recurrent Unit.
Anwesha Mukherjee, Rajkumar Buyya
wiley +1 more source
ABSTRACT Australia is a maritime nation, relying on access to its surrounding oceans for its economy and security. The Royal Australian Navy conducts undersea surveillance to monitor this vital maritime environment and gain insight into activities beneath the ocean's surface.
Timothy J. Milledge+2 more
wiley +1 more source
Constraint solving for bounded-process cryptographic protocol analysis [PDF]
Jonathan K. Millen, Vitaly Shmatikov
openalex +1 more source
ABSTRACT Blockchain (BC) technology is widely believed to be the next disruptive technology that can address challenges in higher education institutions (HEIs) and support resilient strategies. This study aims to contribute to the literature and inform policymakers about BC's capability and potential in HE by examining enablers, barriers and contextual
Buddhi Pathak+2 more
wiley +1 more source
ABSTRACT Blockchain (BC) systems are increasingly used by consortia to monitor ex‐post opportunism in food supply chains. BC systems differ for BC technical characteristics, complementary technologies, and organizational tools. Yet, little is empirically known about the link between different BC system designs and the context where they are implemented
Pamela Danese, Pietro Romano
wiley +1 more source
Electronic voting, based on cryptographic protocols and blockchain technology, represents an advanced method for ensuring the security, transparency, and reliability of electoral processes.
Tolegen Aidynov+3 more
doaj +1 more source
Algorithms of the protected information exchange in radio channels of a space navigation system
To improve the security of information exchange throw navigation space system radio channels to prevent unauthorized use of the system is proposed to use high accuracy cryptographic methods to protect signal.
S. V. Shtanko, D. A. Lesnyk
doaj
Cryptographic key distribution and authentication protocols for secure group communication
Andrew Hutchison, Kurt Bauknecht
openalex +1 more source