Results 111 to 120 of about 2,377,005 (278)

Review on cross-chain technology research of blockchains

open access: yes物联网学报, 2022
With the in-depth development and continuous innovation of blockchain technology, blockchain networks suitable for different application scenarios and design requirements have emerged as the times require, the mutual independence of blockchains ...
Chuannian SHEN
doaj   +2 more sources

Hash-Chain based Micropayment without Disclosing Privacy Information [PDF]

open access: bronze, 2005
Yoon-Su Jeong   +3 more
openalex   +1 more source

Intertidal oyster reef elevation restoration: using a durable substrate on Lone Cabbage Reef, Florida, United States

open access: yesRestoration Ecology, EarlyView.
Abstract Introduction Oyster reef restoration has expanded in the Gulf of Mexico, yet many large‐scale projects fail to sustain ecological or physical outcomes. A key challenge is maintaining vertical relief in dynamic estuarine settings, where low elevation and cultch degradation limit recruitment and reef persistence.
Joseph Aufmuth   +4 more
wiley   +1 more source

The Drivers of Science Referenced in US EPA Regulatory Impact Analyses: Open Access, Professional Popularity, and Agency Involvement

open access: yesRegulation &Governance, EarlyView.
ABSTRACT We perform bibliometric analysis on documents for 255 Regulatory Impact Analyzes (RIAs) prepared by the US Environmental Protection Agency (EPA) from 1980 through 2024. Using a series of automated information extraction methods, we extract references from these documents and match them to bibliographic records.
Tyler A. Scott, Sojeong Kim, Liza Wood
wiley   +1 more source

Securing End‐To‐End Encrypted File Sharing Services With the Messaging Layer Security Protocol

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 27-28, 25 December 2025.
ABSTRACT Secure file sharing is essential in today's digital environment, yet many systems remain vulnerable: if an attacker steals client keys, they can often decrypt both past and future content. To address this challenge, we propose a novel file‐sharing architecture that strengthens post‐compromise security while remaining practical.
Roland Helmich, Lars Braubach
wiley   +1 more source

From rights to runtime: Privacy engineering for agentic AI

open access: yesAI Magazine, Volume 46, Issue 4, Winter 2025.
Abstract Agentic AI shifts stacks from request‐response to plan‐execute. Systems no longer just answer; they act—planning tasks, calling tools, keeping memory, and changing external state. That shift moves privacy from policy docs into the runtime.
Keivan Navaie
wiley   +1 more source

De Novo Whole Genome Assemblies of Unusual Case‐Making Caddisflies (Trichoptera) Highlight Genomic Convergence in the Composition of the Major Silk Gene (h‐fibroin)

open access: yesJournal of Experimental Zoology Part B: Molecular and Developmental Evolution, Volume 344, Issue 7, Page 442-453, November 2025.
The major silk gene, h‐fibroin, was annotated in high‐quality genomes of two unusual case‐making Trichoptera. H‐Fibroin of Limnocentropus insolitus shows a similar amino acid composition to other case‐making species, while the amino acid composition of h‐fibroin of Phryganopsyche brunnea resembles that of retreat‐making species.
Xiling Deng   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy