Results 91 to 100 of about 70,639 (257)
Abstract Illegal wildlife trade (IWT) is one of the largest global illegal activities, and it negatively affects biodiversity and sustainable development worldwide. DNA barcoding coupled with high‐throughput sequencing (i.e., metabarcoding) is useful in identifying taxa affected by IWT and has been used routinely for decades.
Maria Joana Ferreira da Silva +9 more
wiley +1 more source
Deconstructing the Blockchain to Approach Physical Limits [PDF]
Transaction throughput, confirmation latency and confirmation reliability are fundamental performance measures of any blockchain system in addition to its security. In a decentralized setting, these measures are limited by two underlying physical network
Bagaria, Vivek +4 more
core +1 more source
An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains [PDF]
Haiping Huang +5 more
openalex +1 more source
Digital signatures over hash-entangled chains [PDF]
In this work we introduce a new approach for digital signature based on hash chains. The method is supported on the well known security principles of hash functions. Some main advantages of this public key system include security and estimated efficiency through the so called signature chains.
openaire +1 more source
A link between increased temperature and avian body condition in a logged tropical forest
Abstract The combined effects of anthropogenic disturbances, such as logging and climate change, remain poorly understood; yet, they are the main threats to tropical biodiversity. Most tropical African countries lack long‐term climate data, so climate impacts on biodiversity cannot be assessed.
Moreen Uwimbabazi +7 more
wiley +1 more source
Novel Hash-time-lock-contract Based Cross-chain Token Swap Mechanism of Blockchain
Feng Liu
openalex +2 more sources
The Myths of Blockchain Governance
ABSTRACT Research Question/Issue Blockchain technology promises to revolutionize governance through strong commitments, trustlessness, and transparency. This paper examines how these promises have failed to materialize in practice. Research Findings/Insights Drawing on case evidence from major blockchains, including Bitcoin and Ethereum, I argue that ...
Daniel Ferreira
wiley +1 more source
A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks. [PDF]
Hakeem SAA, El-Kader SMA, Kim H.
europepmc +1 more source
Generalized Hash Chain Traversal with Selective Output
A hash chain H for a one-way hash function h(·) is a sequence of hash values , where v0 is a public value, vn a secret value, and vi =h(vi+1). A hash chain traversal algorithm T computes and outputs the hash chain H, returning vi in time period (called round) i for 1 ≤ i ≤ n.
Yum, DH, Seo, JW, Cho, K, Lee, PJ
openaire +3 more sources
Abstract This paper contributes to the understanding of the complex relationship between British economic performance during the Napoleonic wars and the ‘West Indies’, as the Caribbean slave colonies were called. Not only did profits from slave‐based commerce provide financing for the growth of the financial sector, as has been claimed, but the risk of
Carolyn Sissoko, Mina Ishizu
wiley +1 more source

