Results 111 to 120 of about 2,377,005 (278)
Review on cross-chain technology research of blockchains
With the in-depth development and continuous innovation of blockchain technology, blockchain networks suitable for different application scenarios and design requirements have emerged as the times require, the mutual independence of blockchains ...
Chuannian SHEN
doaj +2 more sources
Hash-Chain based Micropayment without Disclosing Privacy Information [PDF]
Yoon-Su Jeong +3 more
openalex +1 more source
Abstract Introduction Oyster reef restoration has expanded in the Gulf of Mexico, yet many large‐scale projects fail to sustain ecological or physical outcomes. A key challenge is maintaining vertical relief in dynamic estuarine settings, where low elevation and cultch degradation limit recruitment and reef persistence.
Joseph Aufmuth +4 more
wiley +1 more source
ABSTRACT We perform bibliometric analysis on documents for 255 Regulatory Impact Analyzes (RIAs) prepared by the US Environmental Protection Agency (EPA) from 1980 through 2024. Using a series of automated information extraction methods, we extract references from these documents and match them to bibliographic records.
Tyler A. Scott, Sojeong Kim, Liza Wood
wiley +1 more source
An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains [PDF]
Haiping Huang +5 more
openalex +1 more source
An Authentication Scheme Based on Novel Construction of Hash Chains for Smart Mobile Devices [PDF]
Qinglong Huang +4 more
openalex +1 more source
Securing End‐To‐End Encrypted File Sharing Services With the Messaging Layer Security Protocol
ABSTRACT Secure file sharing is essential in today's digital environment, yet many systems remain vulnerable: if an attacker steals client keys, they can often decrypt both past and future content. To address this challenge, we propose a novel file‐sharing architecture that strengthens post‐compromise security while remaining practical.
Roland Helmich, Lars Braubach
wiley +1 more source
Mutual Friendly Force Identification Protocol based on Hash-Chain for Personal Combat Systems [PDF]
Jongkwan Lee
openalex +1 more source
From rights to runtime: Privacy engineering for agentic AI
Abstract Agentic AI shifts stacks from request‐response to plan‐execute. Systems no longer just answer; they act—planning tasks, calling tools, keeping memory, and changing external state. That shift moves privacy from policy docs into the runtime.
Keivan Navaie
wiley +1 more source
The major silk gene, h‐fibroin, was annotated in high‐quality genomes of two unusual case‐making Trichoptera. H‐Fibroin of Limnocentropus insolitus shows a similar amino acid composition to other case‐making species, while the amino acid composition of h‐fibroin of Phryganopsyche brunnea resembles that of retreat‐making species.
Xiling Deng +4 more
wiley +1 more source

