Preventing the bitcoin Double Spend using Transaction Hash and Unspent Transaction Output
A. Murugan, J. Vijayalakshmi
openalex +1 more source
Blockchain for video watermarking: An enhanced copyright protection approach for video forensics based on perceptual hash function. [PDF]
Darwish SM, Abu-Deif MM, Elkaffas SM.
europepmc +1 more source
Locality-sensitive bucketing functions for the edit distance. [PDF]
Chen K, Shao M.
europepmc +1 more source
Governing the Algorithmic City
Philosophy &Public Affairs, Volume 53, Issue 2, Page 102-168, Spring 2025.
Seth Lazar
wiley +1 more source
A two-phase spatiotemporal chaos-based protocol for data integrity in IoT. [PDF]
Alkhonaini MA+3 more
europepmc +1 more source
Sparse Convolution FPGA Accelerator Based on Multi-Bank Hash Selection. [PDF]
Xu J, Pu H, Wang D.
europepmc +1 more source
Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF
Nilanjan Datta+3 more
openalex +2 more sources
txci-ATAC-seq: a massive-scale single-cell technique to profile chromatin accessibility. [PDF]
Zhang H+8 more
europepmc +1 more source
Overloading And unpacKing (OAK) - droplet-based combinatorial indexing for ultra-high throughput single-cell multiomic profiling. [PDF]
Wu B+19 more
europepmc +1 more source
ElasticPay: Instant Peer-to-Peer Offline Extended Digital Payment System. [PDF]
Reddy AVSK, Banda G.
europepmc +1 more source