Results 81 to 90 of about 1,801,560 (284)

Leveraging Blockchain and Smart Contracts to Combat Greenwashing in Sustainable Development

open access: yesSustainable Development, EarlyView.
ABSTRACT Blockchain technology, when combined with smart contracts, enables buyers to distinguish between greenwashed and genuinely eco‐friendly products. The presence of counterfeit items can severely impact supply chains by diminishing brand value, eroding consumer confidence, and undermining market trust.
Ragnhild Silkoset, Arne Nygaard
wiley   +1 more source

Tailored Growth of Transition Metal Dichalcogenides’ Monolayers by Chemical Vapor Deposition

open access: yesSmall, EarlyView.
Here, results on the tailored growth of various 2D semiconductors’ monolayers of transition metal dichalcogenides are presented using chemical vapor deposition techniques. Basic electronic, photonic and optoelectronic properties of the grown quantum materials are studied by high‐resolution microscopy and spectroscopy techniques and are analyzed for ...
Andrey Turchanin, Antony George
wiley   +1 more source

Investigating Developer Sentiments in Software Components: An Exploratory Case Study of Gentoo

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Background Developers, who are the main driving force behind software development, have central work in handling software components such as modules, libraries, and frameworks, which are the backbone of a project's architecture. Managing these components well ensures the smooth implementation of new features, maintains system integrity, and ...
Tien Rahayu Tulili   +2 more
wiley   +1 more source

Blockchain‐Based Federated Learning Methodologies in Smart Environments for Drone Technology

open access: yesIEEJ Transactions on Electrical and Electronic Engineering, EarlyView.
High‐security transactions are stored in a chain of blocks using blockchain technology. Security and privacy concerns may be addressed by using blockchain technology. Federated learning is a paradigm for increasing data mining accuracy and precision by ensuring data privacy and security for both internet of things (IoT) devices and users in smart ...
Mukkoti Maruthi Venkata Chalapathi   +6 more
wiley   +1 more source

How to Formalize Loop Iterations in Cryptographic Protocols Using ProVerif

open access: yesIEEE Access
The formal verification of cryptographic protocols has been extensively studied in recent years. To verify the cryptographic protocol security, formal verification tools consider protocol properties as interactive processes involving a cryptographic ...
Takehiko Mieno   +3 more
doaj   +1 more source

Composable security in relativistic quantum cryptography

open access: yesNew Journal of Physics, 2019
Relativistic protocols have been proposed to overcome certain impossibility results in classical and quantum cryptography. In such a setting, one takes the location of honest players into account, and uses the signalling limit given by the speed of light
V Vilasini   +2 more
doaj   +1 more source

A Probabilistic Scheduler for the Analysis of Cryptographic Protocols

open access: yesElectronic Notes in Theoretical Computer Science, 2007
AbstractWhen modelling cryto-protocols by means of process calculi which express both nondeterministic and probabilistic behavior, it is customary to view the scheduler as an intruder. It has been established that the traditional scheduler needs to be carefully calibrated in order to more accurately reflect the intruder's capabilities for controlling ...
John Mullins   +2 more
openaire   +3 more sources

Expert Consensus‐Based Technical Guidelines for Remote Robotic‐Assisted Surgery and Procedures

open access: yesWorld Journal of Surgery, EarlyView.
Remote robotic‐assisted surgery and procedures offer significant potential to enhance access to surgical expertise, optimize patient outcomes, improve healthcare efficiency, reduce costs, and increase patient and provider satisfaction, aligning with the quintuple aim.
Yulun Wang   +9 more
wiley   +1 more source

Simple, Near-Optimal Quantum Protocols for Die-Rolling

open access: yesCryptography, 2017
Die-rolling is the cryptographic task where two mistrustful, remote parties wish to generate a random D-sided die-roll over a communication channel. Optimal quantum protocols for this task have been given by Aharon and Silman (New Journal of Physics ...
Jamie Sikora
doaj   +1 more source

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy