Results 91 to 100 of about 6,906 (225)
An Authentication Scheme Based on Novel Construction of Hash Chains for Smart Mobile Devices [PDF]
Qinglong Huang+4 more
openalex +1 more source
Abstract Next‐generation sequencing data are widely utilised for various downstream applications in bioinformatics and numerous techniques have been developed for PCR‐deduplication and error‐correction to eliminate bias and errors introduced during the sequencing.
Pengyao Ping+4 more
wiley +1 more source
Mutual Friendly Force Identification Protocol based on Hash-Chain for Personal Combat Systems [PDF]
Jongkwan Lee
openalex +1 more source
ABSTRACT The increasing complexity and frequency of cyberattacks present significant challenges to Intrusion Detection Systems (IDS), mainly unknown (zero‐day) attacks. IDS are essential for safeguarding networks, but traditional systems struggle to detect unknown threats in dynamic and evolving network environments due to their reliance on predefined ...
Daniel Mourão Martins+2 more
wiley +1 more source
Analysis of cross-chain technology of blockchain
With the development of blockchain technology,more and more blockchain projects have appeared.Due to the closure property of the blockchain,different blockchains have become islands of value.The information interaction and value transfer problems between
Zhao GUO+4 more
doaj +2 more sources
Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography. [PDF]
Hakeem SAA, El-Gawad MAA, Kim H.
europepmc +1 more source
Generic Quantum‐Safe IIoT Forensics Framework (QS‐IIoT‐F) ABSTRACT The continuous evolution of quantum computing has shown novel and transformative possibilities and critical implications for the Industrial Internet of Things (IIoT) forensic processes.
Victor R. Kebande
wiley +1 more source
Hardware Security in the Connected World
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee+4 more
wiley +1 more source
A Guide to Machine Learning Epistemic Ignorance, Hidden Paradoxes, and Other Tensions
ABSTRACT Machine learning (ML) has rapidly scaled in capacity and complexity, yet blind spots persist beneath its high performance façade. In order to shed more light on this argument, this paper presents a curated catalogue of 175 unconventional concepts, each capturing a paradox, tension, or overlooked risk in modern ML practice.
M. Z. Naser
wiley +1 more source
Privacy Protection System of EMR Based on Hash Chain [PDF]
Dang Ying+6 more
openalex +1 more source