Results 91 to 100 of about 2,338,489 (263)

Singapore upon the Korea Strait? Cyberlibertarian Desires and Anxious Regulation in Busan's Blockchain Regulation Free Zone

open access: yesAntipode, EarlyView.
Abstract This article examines the intersection of Asia's blockchain industry and special economic zones (SEZs). SEZs have been promoted to localise blockchain technology by disparate actors from cyberlibertarian figures to Asian blockchain firms, national policymakers, and local politicians.
Jamie Doucette, Seung‐Ook Lee
wiley   +1 more source

Integrated Model of Image Protection Techniques

open access: yesJournal of Imaging, 2017
We propose an integrated model of Block-Permutation-Based Encryption (BPBE) and Reversible Data Hiding (RDH). The BPBE scheme involves four processes for encryption, namely block scrambling, block-rotation/inversion, negative-positive transformation and ...
Anu Aryal   +3 more
doaj   +1 more source

Current application of blockchain technology in healthcare and its potential roles in Urology

open access: yesBJU International, EarlyView.
Objective To assess the current uses of blockchain technology in surgery and explore potential applications in urology. Methods A systematic literature review and critical appraisal was performed. The PubMed database was searched for all relevant papers published in English, between 2003 and 2023, on blockchain and surgery, and urology.
Sulleyman Felemban   +6 more
wiley   +1 more source

3DGS.zip: A survey on 3D Gaussian Splatting Compression Methods

open access: yesComputer Graphics Forum, EarlyView.
Abstract 3D Gaussian Splatting (3DGS) has emerged as a cutting‐edge technique for real‐time radiance field rendering, offering state‐of‐the‐art performance in terms of both quality and speed. 3DGS models a scene as a collection of three‐dimensional Gaussians, with additional attributes optimized to conform to the scene's geometric and visual properties.
M. T. Bagdasarian   +6 more
wiley   +1 more source

Digital signatures over HMAC entangled chains

open access: yesEngineering Science and Technology, an International Journal, 2022
In this work we present a new digital signature method based on hash chains and the hash message authentication code (HMAC). Unlike Blockchain technology, our approach establishes that the database of transactions is distributed among users, so each one ...
Luis Adrián Lizama-Pérez
doaj  

Generalized Hash Chain Traversal with Selective Output

open access: yesIEICE Transactions on Information and Systems, 2010
A hash chain H for a one-way hash function h(·) is a sequence of hash values , where v0 is a public value, vn a secret value, and vi =h(vi+1). A hash chain traversal algorithm T computes and outputs the hash chain H, returning vi in time period (called round) i for 1 ≤ i ≤ n.
Yum, DH, Seo, JW, Cho, K, Lee, PJ
openaire   +4 more sources

Random Access Segmentation Volume Compression for Interactive Volume Rendering

open access: yesComputer Graphics Forum, EarlyView.
Abstract Segmentation volumes are voxel data sets often used in machine learning, connectomics, and natural sciences. Their large sizes make compression indispensable for storage and processing, including GPU video memory constrained real‐time visualization.
M. Piochowiak   +2 more
wiley   +1 more source

Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions

open access: yesIACR Transactions on Symmetric Cryptology, 2018
We provide a survey about generic attacks on cryptographic hash constructions including hash-based message authentication codes and hash combiners. We look into attacks involving iteratively evaluating identical mappings many times.
Zhenzhen Bao, Jian Guo, Lei Wang
doaj   +1 more source

Preventing financial ruin: How the West India trade fostered creativity in crisis lending by the Bank of England

open access: yesThe Economic History Review, EarlyView.
Abstract This paper contributes to the understanding of the complex relationship between British economic performance during the Napoleonic wars and the ‘West Indies’, as the Caribbean slave colonies were called. Not only did profits from slave‐based commerce provide financing for the growth of the financial sector, as has been claimed, but the risk of
Carolyn Sissoko, Mina Ishizu
wiley   +1 more source

Interaction of TFAP2A with the Ku70/80 complex is crucial for HIF‐dependent activation of hypoxia‐inducible genes

open access: yesThe FEBS Journal, EarlyView.
Under normoxic conditions, the SUMOylated fraction of TFAP2A cannot interact with the Ku70/Ku80 complex, nor it can bind to chromatin. The unSUMOylated fraction pre‐occupies the chromatin of a subset of hypoxia‐induced genes together with the Ku70/Ku80 complex for basal euchromatin formation. Under hypoxic conditions, the SUMOylation equilibrium shifts
Amalia Kanoura   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy