Results 31 to 40 of about 2,144,321 (256)
Augmenting integrity and scalability in mobile payment applications using blockchain [PDF]
The transactional information from the mobile wallets is offloaded from the mobile device to the mobile transaction server. The transaction involves various communication standards, confidential transaction information to ensure flawless transaction of ...
David Shibin+3 more
doaj +1 more source
Securing Financial Transactions with a Robust Algorithm: Preventing Double-Spending Attacks
A zero-confirmation transaction is a transaction that has not yet been confirmed on the blockchain and is not yet part of the blockchain. The network propagates zero-confirmation transactions quickly, but they are not secured against double-spending ...
Hasan Hashim+5 more
doaj +1 more source
Abstract Blockchain is increasingly lauded as an enabler of the transition to a circular economy. While there is considerable conceptual research and some empirical studies on this phenomenon, scholars have yet to develop a theoretical model of blockchain's role in this transition.
Moritz Böhmecke‐Schwafert+2 more
wiley +1 more source
Getting back to (nucleo)base: Oligonucleotides incorporating a central 1‐ or 8‐mercuri‐6‐phenyl‐1H‐carbazole residue show great promise as high‐affinity hybridization probes, discriminating between all canonical nucleobases as well as 2‐ and 4‐thiothymines by melting temperature margins of at least 5 °C.
Tharun K. Kotammagari+2 more
wiley +1 more source
The paper objective is to determine the basic schemes and their characteristics for ensuring the security of Internet of Things nodes using symmetric authentication cryptographic microcircuits.
Petro Klimushin+3 more
doaj +1 more source
We evaluate the biogeomorphological impacts of seaweed on materials commonly used in maritime built heritage restoration. After 6 months of exposure to intertidal conditions, we found no evidence of enhanced deterioration of mortar prepared using natural cement when covered with seaweed compared to uncovered mortar.
Timothy Baxter+2 more
wiley +1 more source
Groundwater overuse in different domains will eventually lead to global freshwater scarcity. To meet the anticipated demands, many governments worldwide are employing innovative and traditional techniques for forecasting groundwater availability by ...
Sukrutha L. T. Vangipuram+3 more
doaj +1 more source
Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model
We present two tweakable wide block cipher modes from doubly-extendable cryptographic keyed (deck) functions and a keyed hash function: double-decker and docked-double-decker.
Aldo Gunsing, Joan Daemen, Bart Mennink
doaj +1 more source
Abstract Type 1 diabetes (T1D) presents with two therapeutic challenges: the need to correct underlying autoimmunity and restore β‐cell mass. We harnessed the unique capacity of regulatory T cells (Tregs) and the T cell receptor (TCR) to direct tolerance induction along with tissue‐localized delivery of therapeutic agents to restore endogenous β‐cell ...
Gregory P. Marshall+7 more
wiley +1 more source
Bipartite Random Graphs and Cuckoo Hashing [PDF]
The aim of this paper is to extend the analysis of Cuckoo Hashing of Devroye and Morin in 2003. In particular we make several asymptotic results much more precise.
Reinhard Kutzelnigg
doaj +1 more source