Results 51 to 60 of about 7,578 (241)
Fair micropayment system based on hash chains
Micropayment schemes usually do not provide fairness, which means that either the customer or the merchant, or both, can cheat each other and gain a financial advantage by misusing the protocols. This paper proposes an efficient hash chain-based micropayment scheme, which is an offline, prepaid scheme that supports simpler divisibility of digital coins.
Zongkai Yang, Weimin Lang, Yunmeng Tan
openaire +1 more source
This study introduces a tree‐based machine learning approach to accelerate USP8 inhibitor discovery. The best‐performing model identified 100 high‐confidence repurposable compounds, half already approved or in clinical trials, and uncovered novel scaffolds not previously studied. These findings offer a solid foundation for rapid experimental follow‐up,
Yik Kwong Ng +4 more
wiley +1 more source
Atomic and privacy-preserving cyclic cross-chain protocol based on chameleon hash function
Blockchain-based digital assets have increasingly emerged in recent years, necessitating cross-chain swaps. Hash Time-Lock Contract (HTLC) is a widely used protocol for such swaps; however, simple hash time locks can allow attackers to analyze ...
Mengyan Li, Maoning Wang, Meijiao Duan
doaj +1 more source
Encrypted data inquiries using chained perfect hashing (CPH) [PDF]
Cryptography is the practice of transforming data to indecipherable by a third party, unless a particular piece of secret information is made available to them. Data encryption has been paid a great attention to protect data. As data sizes are growing, so does the need for efficient data search while being encrypted to protect it during transmission ...
Khalid Kaabneh +2 more
openaire +1 more source
Securing Generative Artificial Intelligence with Parallel Magnetic Tunnel Junction True Randomness
True random numbers can protect generative artificial intelligence (GAI) models from attacks. A highly parallel, spin‐transfer torque magnetic tunnel junction‐based system is demonstrated that generates high‐quality, energy‐efficient random numbers.
Youwei Bao, Shuhan Yang, Hyunsoo Yang
wiley +1 more source
A Mobile-Oriented System for Integrity Preserving in Audio Forensics
This paper addresses a problem in the field of audio forensics. With the aim of providing a solution that helps Chain of Custody (CoC) processes, we propose an integrity verification system that includes capture (mobile based), hash code calculation and ...
Diego Renza +2 more
doaj +1 more source
A comprehensive survey on the application of blockchain/hash chain technologies in V2X communications [PDF]
Hassan Farran +2 more
openalex +1 more source
Abstract Blockchain technology is a digital decentralized data ledger recording transactions in an encrypted format. Its implementation can potentially hold significant advantages for the built environment, particularly in manufacturing and building product usage aligned with Building Information Modeling (BIM). This paradigm shift toward decentralized
Aileen Pfeil +2 more
wiley +1 more source
Straight to Phase III: Model‐informed approach speeds depemokimab clinical development in interleukin‐5‐driven diseases. IL‐5, a key mediator of type 2 inflammation, underlies various diseases, including severe asthma, CRSwNP, EGPA, and HES. Reduction in blood eosinophil count (BEC), a biomarker of IL‐5 activity, is commonly used to evaluate the ...
Chiara Zecchin +6 more
wiley +1 more source
ABSTRACT Purpose To develop a self‐supervised scan‐specific deep learning framework for reconstructing accelerated multiparametric quantitative MRI (qMRI). Methods We propose REFINE‐MORE (REference‐Free Implicit NEural representation with MOdel REinforcement), combining an implicit neural representation (INR) architecture with a model reinforcement ...
Ruimin Feng +3 more
wiley +1 more source

