Results 71 to 80 of about 7,578 (241)
Generalized Hash Chain Traversal with Selective Output
A hash chain H for a one-way hash function h(·) is a sequence of hash values , where v0 is a public value, vn a secret value, and vi =h(vi+1). A hash chain traversal algorithm T computes and outputs the hash chain H, returning vi in time period (called round) i for 1 ≤ i ≤ n.
Yum, DH, Seo, JW, Cho, K, Lee, PJ
openaire +3 more sources
Abstract Illegal wildlife trade (IWT) is one of the largest global illegal activities, and it negatively affects biodiversity and sustainable development worldwide. DNA barcoding coupled with high‐throughput sequencing (i.e., metabarcoding) is useful in identifying taxa affected by IWT and has been used routinely for decades.
Maria Joana Ferreira da Silva +9 more
wiley +1 more source
A secure dynamic cross-chain decentralized data consistency verification model
The continuous increase in the number of transactions is exerting significant pressure on the storage capacity of blockchains. By storing data on multiple blockchains and interacting with each other with cross-chain technology, the storage pressure can ...
Jiahao Zhao +4 more
doaj +1 more source
A link between increased temperature and avian body condition in a logged tropical forest
Abstract The combined effects of anthropogenic disturbances, such as logging and climate change, remain poorly understood; yet, they are the main threats to tropical biodiversity. Most tropical African countries lack long‐term climate data, so climate impacts on biodiversity cannot be assessed.
Moreen Uwimbabazi +7 more
wiley +1 more source
Secure energy efficient routing protocol for wireless sensor network
The ease of deployment of economic sensor networks has always been a boon to disaster management applications. However, their vulnerability to a number of security threats makes communication a challenging task.
Das Ayan Kumar +2 more
doaj +1 more source
An Economic Analysis of Difficulty Adjustment Algorithms in Proof‐of‐Work Blockchain Systems
ABSTRACT We study the stability of cryptocurrency systems through difficulty adjustment. Bitcoin's difficulty adjustment algorithm (DAA) exhibits instability when the reward elasticity of the hash rate is high, implying that a sharp price reduction could disrupt the current Bitcoin system.
Shunya Noda +2 more
wiley +1 more source
An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains [PDF]
Haiping Huang +5 more
openalex +1 more source
Intentionality and Attentionality Dynamics in an Institutional Change Process
Abstract In this article, we explore how actors' intentionality emerges, develops, and co‐evolves with institutional change. Although intentions are essential in shaping institutional change agents' motivations and actions, our understanding of their dynamics is limited and biased by the assumption that intentions are usually identifiable prior to ...
Sofiane Baba, Taïeb Hafsi, Omar Hemissi
wiley +1 more source
A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks. [PDF]
Hakeem SAA, El-Kader SMA, Kim H.
europepmc +1 more source
ABSTRACT We perform bibliometric analysis on documents for 255 Regulatory Impact Analyzes (RIAs) prepared by the US Environmental Protection Agency (EPA) from 1980 through 2024. Using a series of automated information extraction methods, we extract references from these documents and match them to bibliographic records.
Tyler A. Scott, Sojeong Kim, Liza Wood
wiley +1 more source

