Results 131 to 140 of about 1,929,820 (318)

Can Complementary Currencies Foster Sustainability? A Systematic Review of the Impacts of Environmental Complementary Currencies

open access: yesJournal of Economic Surveys, EarlyView.
ABSTRACT Growing financial needs for a sustainable transition have led to the development of green finance and citizen‐led monetary innovations. These initiatives recognized the necessity of developing new forms of money regarding the environmental crisis, referred to as environmental complementary currency (ECCs).
Léo Revelli
wiley   +1 more source

Make Social Media Social Again: How Platform Interoperability Can Fix Social Media and Future‐Proof Democracy

open access: yesJournal of Management Studies, EarlyView.
Abstract This essay argues that social media document (rather than fuel) the decline of political democracy while helping revive organizational democracy, including through ‘decentralized autonomous organizations’ (DAOs). Yet, despite giving everyone a voice and the ability to organize across borders, social media could over‐concentrate power if, in ...
J.P. Vergne
wiley   +1 more source

Knowledge Flow Analysis for Security Protocols

open access: yes, 2005
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of knowledge amongst principals. Because this characterization corresponds closely
Devadas, Srinivas   +4 more
core   +1 more source

Agents' Behavior and Interest Rate Model Optimization in DeFi Lending

open access: yesMathematical Finance, EarlyView.
ABSTRACT Contrasting sharply with traditional money, bond, and bond futures markets, where interest rates emerge organically from participant interactions, DeFi lending platforms employ rule‐based interest rates that are algorithmically set. Thus, the selection of an effective interest rate model (IRM) is paramount for the success of a lending protocol.
Charles Bertucci   +4 more
wiley   +1 more source

Universally composable security: a new paradigm for cryptographic protocols

open access: yesProceedings IEEE International Conference on Cluster Computing, 2001
R. Canetti
semanticscholar   +1 more source

Rethinking Blockchain and Power Dynamics in Supply Chains: A Critical Discourse Analysis

open access: yesJournal of Business Logistics, Volume 47, Issue 1, January 2026.
ABSTRACT Despite a generally positive discourse on blockchain technology in academic literature, firms have struggled to implement it in their supply chains. In this article, we are deconstructing the typically positive perception of blockchain in the literature through a provocative style of theorizing and critical discourse analysis.
Lara Schilling   +2 more
wiley   +1 more source

Securing End‐To‐End Encrypted File Sharing Services With the Messaging Layer Security Protocol

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 27-28, 25 December 2025.
ABSTRACT Secure file sharing is essential in today's digital environment, yet many systems remain vulnerable: if an attacker steals client keys, they can often decrypt both past and future content. To address this challenge, we propose a novel file‐sharing architecture that strengthens post‐compromise security while remaining practical.
Roland Helmich, Lars Braubach
wiley   +1 more source

Russian Cryptographic Algorithms in the Identity Management Systems

open access: yesБезопасность информационных технологий, 2011
The subject of the research is to implement Russian cryptographic algorithms in the IdM-systems. The research centers on the study of the claim-based authentication protocols and the existing IdM-systems and on the development of an authentication module
A.V. Dubovitskaya, P. V. Smirnov
doaj  

Home - About - Disclaimer - Privacy