Results 111 to 120 of about 133,439 (330)
MiniPASS: Authentication and Digital Signatures in a Constrained Environment [PDF]
Jeffrey Hoffstein, Joseph H. Silverman
openalex +1 more source
The MaterialDigital initiative drives the digital transformation of material science by promoting findable, accessible, interoperable, and reusable principles and enhancing data interoperability. This article explores the role of scientific workflows, highlights challenges in their adoption, and introduces the Workflow Store as a key tool for sharing ...
Simon Bekemeier+37 more
wiley +1 more source
Efficient Arbitrated Quantum Digital Signature with Multi-Receiver Verification [PDF]
Quantum digital signature is used to authenticate the identity of the signer with information theoretical security, while providing non-forgery and non-repudiation services. In traditional multi-receiver quantum digital signature schemes without an arbitrater, the transferability of one-to-one signature is always required to achieve unforgeability ...
arxiv
A Cryptographic Study of Some Digital Signature Schemes [PDF]
In this thesis, we propose some directed signature schemes. In addition, we have discussed their applications in different situations. In this thesis, we would like to discuss the security aspects during the design process of the proposed directed digital signature schemes.
arxiv
This study explores aerosol jet‐printed (AJP) surface roughness, its effects on the performance of microwave electronics, and its process contributors. First, an electromagnetic model is vetted for AJP's unique roughness signature. Simulations are built which show process‐induced roughness is as significant as conductor resistivity in driving microwave
Christopher Areias, Alkim Akyurtlu
wiley +1 more source
Embedding Digital Signature into CSV Files Using Data Hiding [PDF]
Open data is an important basis for open science and evidence-based policymaking. Governments of many countries disclose government-related statistics as open data. Some of these data are provided as CSV files. However, since CSV files are plain texts, we cannot ensure the integrity of a downloaded CSV file.
arxiv
This study introduces a conductive nerve guidance conduit integrated with wireless electrical stimulation through alternating magnetic fields, which induces currents and creates a supportive microenvironment for nerve regeneration. In vivo studies show that this approach significantly enhanced myelin restoration, gastrocnemius muscle regeneration ...
Shiheng Liu+7 more
wiley +1 more source
Astudy on development of electronic signature based on rsa public key encryption
Nowadays in electronic transactions, the digital signature is a form to identify users. Construction processes of digital signature are usually based on algorithm DSA, of which the most popular is the RSA public key cryptography.
Lê Xuân Trường+1 more
doaj
Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs [PDF]
Adrian Spalka+2 more
openalex +1 more source
Internal Temperature Evolution Metrology and Analytics in Li‐Ion Cells
This study investigates the non‐linear evolution of internal temperatures across diverse operating conditions, highlighting the disparities between internal and external measurements and the resulting thermal asymmetries. The coupled thermo‐electrochemical modeling framework provides a comprehensive analysis of various heat generation modes, examining ...
Anuththara S. J. Alujjage+5 more
wiley +1 more source