Results 31 to 40 of about 461 (143)
Researchers concentrate on data security using cryptography, using different approaches to protect confidential data, such as digital images holding private information.
Tanveer Qayyum +4 more
doaj +1 more source
ABSTRACT The analysis of certain properties of the underlying graph of a public transport network generates insights about the network's structure. Hereby, the choice of the graph representation depends on a trade‐off between complexity reduction and information preservation to adequately model a public transport network.
Michael Palk +2 more
wiley +1 more source
On the Security of Split-and-Lookup-Based ZK-Friendly Primitives
Arithmetization-Oriented hash functions are optimized for their verification to be efficiently implemented within various proof systems, but they are often too slow when evaluated on a regular machine.
Antoine Bak, Léo Perrin
doaj +1 more source
Hydrogen‐based direct reduced iron (H‐DRI) melts differently from scrap and carbon‐bearing DRI. This work combines differential scanning calorimetry experiments, FactSage thermodynamics, and simple composition‐based regression to predict solidus, liquidus, heat capacity, and enthalpy for H‐DRI.
Ankur Agnihotri +3 more
wiley +1 more source
Abstract This study examines the adaptive market hypothesis in the prewar and wartime Japanese stock market using a new market capitalization‐weighted price index. First, we find that the degree of market efficiency varies over time and with major historical events. This implies that the hypothesis is supported in this market.
Kenichi Hirayama, Akihiko Noda
wiley +1 more source
An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity [PDF]
After the improvement by Courtois and Meier of the algebraic attacks on stream ciphers and the introduction of the related notion of algebraic immunity, several constructions of infinite classes of Boolean functions with optimum algebraic immunity have been proposed.
Claude Carlet, Keqin Feng
openaire +1 more source
ABSTRACT Lucid dreaming, defined as the experience of becoming aware of dreaming while dreaming, offers a unique window into a state of consciousness characterised by a blending of the sensory vividness of REM sleep with the self‐awareness of wakefulness. While past functional imaging has shed light on the neural activity supporting lucid dreaming, the
Nicola De Pisapia +4 more
wiley +1 more source
How Fast can be Algebraic Attacks on Block Ciphers?
In my talk I did overwiev the area of algebraic attacks on block ciphers, explain what fast algebraic attacks on block cipher are, and what results can already be achieved. This covers a vast amount of work (several papers, most of them not published) that I cannot include here in totality due to the lack of space.
openaire +3 more sources
ABSTRACT We consider the problem of sequential (online) estimation of a single change point in a piecewise linear regression model under a Gaussian setup. We demonstrate that certain CUSUM‐type statistics attain the minimax optimal rates for localizing the change point.
Annika Hüselitz, Housen Li, Axel Munk
wiley +1 more source
Abstract figure legend Schematic overview of the experimental and computational framework for investigating hiPSC‐CM electrophysiology with MEA systems. The MEA‐based model integrates experimental data with phenotype‐specific ionic models and tissue‐level heterogeneity.
Sofia Botti +2 more
wiley +1 more source

