Results 61 to 70 of about 2,338,489 (263)
Fast Verification of Hash Chains [PDF]
A hash chain is a sequence of hash values x i = hash(x i − 1) for some initial secret value x 0. It allows to reveal the final value x n and to gradually disclose the pre-images x n − 1, x n − 2, ... whenever necessary. The correctness of a given value x i can then be verified by re-computing the chain and comparing the result to x n .
openaire +2 more sources
Abstract Blockchain technology is a digital decentralized data ledger recording transactions in an encrypted format. Its implementation can potentially hold significant advantages for the built environment, particularly in manufacturing and building product usage aligned with Building Information Modeling (BIM). This paradigm shift toward decentralized
Aileen Pfeil+2 more
wiley +1 more source
Factors Influencing the Binding of HIV‐1 Protease Inhibitors: Insights from Machine Learning Models
Machine learning unlocks the secrets of HIV‐1 protease inhibition, paving the way for data‐driven antiviral drug design. This study analyzes crystallographic data from hundreds of protein–ligand complexes, predicting ligand binding affinity with over 85% accuracy.
Yaffa Shalit, Inbal Tuvi‐Arad
wiley +1 more source
Supply chain dynamic multi-center coordination authentication model based on block chain
The value of block chain technology is proved by the success of Bitcoin. The characteristics, limitations and its chain structure Hash principle of block chain were analyzed, the applications of block chain technology were researched, the B2B+B2C supply ...
Jian-ming ZHU, Yong-gui FU
doaj +3 more sources
A Mobile-Oriented System for Integrity Preserving in Audio Forensics
This paper addresses a problem in the field of audio forensics. With the aim of providing a solution that helps Chain of Custody (CoC) processes, we propose an integrity verification system that includes capture (mobile based), hash code calculation and ...
Diego Renza+2 more
doaj +1 more source
Scenarios of drug exposure and administration as well as detection assays for drugs and methods of sports doping published between 2023 and 2024 are critically reviewed and evaluated in context with the Prohibited List 2024 as established by the World Anti‐Doping Agency.
Mario Thevis+2 more
wiley +1 more source
Analysis and Test of Storage Algorithm of Card Reader of Personnel Positioning System
The paper analyzed three storage algorithms of chain storage algorithm, hash table storage algorithm and hash binary tree storage algorithm which are applicable to the card reader of personnel positioning system in term of search time and storage ...
ZHANG Feng, XU Zhao, ZHANG Kai-ting
doaj
BlockChain (BC), Technology Notary in Data Driven Marketing (DDM) Contracts [PDF]
Today, Data Driven Marketing is challenged by the supply of vague data, inconsistencies between them and fraud through advertising in the digital marketing ecosystem.
Ermal Haxhiaj, Bia Çera
doaj
The major silk gene, h‐fibroin, was annotated in high‐quality genomes of two unusual case‐making Trichoptera. H‐Fibroin of Limnocentropus insolitus shows a similar amino acid composition to other case‐making species, while the amino acid composition of h‐fibroin of Phryganopsyche brunnea resembles that of retreat‐making species.
Xiling Deng+4 more
wiley +1 more source
As an important part of the second defense line of the power system, the Security and Stability Control System (SSCS) is of great significance to ensure the reliable operation of the power system. However, SSCS still lacks an effective security mechanism
Zhaohan Li+5 more
doaj +1 more source