Results 101 to 110 of about 133,439 (330)
Can D.S.A. be improved? — Complexity trade-offs with the digital signature standard — [PDF]
David Naccache+3 more
openalex +1 more source
A hybrid system for de‐icing made of gradient polymer coatings, deposited on aluminum coupled with an electromechanical system, is demonstrated as an effective and durable strategy for reducing drastically ice adhesion. The system is capable of detaching ice blocks over the coating in less than 1 s, regardless of the ice type and covered area ...
Gabriel Hernández Rodríguez+8 more
wiley +1 more source
Research on SIM Card-Based Mobile Digital Signature and Authentication for Financial Services
With the development of smart phones and mobile internet,it is a trend that leveraging mobile devices to perform user authentication for cross industry application,such as electric bank.
Bo Hu+3 more
doaj +2 more sources
Machine learning prediction of blood alcohol concentration: a digital signature of smart-breathalyzer behavior. [PDF]
Aschbacher K+6 more
europepmc +1 more source
New digital signature protocol based on elliptic curves [PDF]
In this work, a new digital signature based on elliptic curves is presented. We established its efficiency and security. The method, derived from a variant of ElGamal signature scheme, can be seen as a secure alternative protocol if known systems are completely broken.
arxiv
Approaches of Digital signature legislation [PDF]
Thomas F. Rebel+2 more
openalex +1 more source
This article provides examples of ontology development in the materials science domain (use‐case of Brinell hardness testing) and gives ontology developers an overview for selecting their desired top‐level ontologies (e.g., BFO, EMMO, PROVO) by considering different evaluation parameters like semantic richness, domain coverage, extensibility ...
Hossein Beygi Nasrabadi+3 more
wiley +1 more source
A Study on the Proposed Korean Digital Signature Algorithm [PDF]
Chae Hoon Lim, Pil Joong Lee
openalex +1 more source
We present a quantum digital signature scheme whose security is based on fundamental principles of quantum physics. It allows a sender (Alice) to sign a message in such a way that the signature can be validated by a number of different people, and all will agree either that the message came from Alice or that it has been tampered with.
Gottesman, Daniel, Chuang, Isaac
openaire +2 more sources
In the current research, how environmental impacts of products can be tracked through complex production networks using semantic data and environmental impact calculations is demonstrated. Here, the example of secondary copper production and the subsequent production of copper alloys is discussed.
Mohsin Sajjad+3 more
wiley +1 more source