Results 71 to 80 of about 2,377,005 (278)

A Mobile-Oriented System for Integrity Preserving in Audio Forensics

open access: yesApplied Sciences, 2019
This paper addresses a problem in the field of audio forensics. With the aim of providing a solution that helps Chain of Custody (CoC) processes, we propose an integrity verification system that includes capture (mobile based), hash code calculation and ...
Diego Renza   +2 more
doaj   +1 more source

Fair micropayment system based on hash chains

open access: yesTsinghua Science and Technology, 2005
Micropayment schemes usually do not provide fairness, which means that either the customer or the merchant, or both, can cheat each other and gain a financial advantage by misusing the protocols. This paper proposes an efficient hash chain-based micropayment scheme, which is an offline, prepaid scheme that supports simpler divisibility of digital coins.
Weimin Lang, Zongkai Yang, Yunmeng Tan
openaire   +2 more sources

A continuous 500‐year sediment record of inundation by local and distant tsunamis in South‐Central Chile (40.1°S)

open access: yesThe Depositional Record, EarlyView.
Tsunami events over the past 500 years inundated Laguna Gemela West (Chile), leading to distinct sandy deposits in the lake record. This provides a complete perspective on tsunami inundation, including giant tsunamis, small local tsunamis and tsunamis that originated >100 km away from the site.
Jasper Moernaut   +8 more
wiley   +1 more source

Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) [PDF]

open access: yes, 2013
A widespread security claim of the Bitcoin system, presented in the original Bitcoin white-paper, states that the security of the system is guaranteed as long as there is no attacker in possession of half or more of the total computational power used to ...
Bahack, Lear
core   +1 more source

Identification of Tetrahydrocannabidiol Metabolites in Human Urine

open access: yesDrug Testing and Analysis, EarlyView.
The detection of Phase I and II metabolites of tetrahydrocannabidiol (H4CBD) in urine after oral ingestion of 25‐mg H4CBD by a volunteer is described. The proposed metabolite structures are based on ESI+ spectra recorded by HPLC‐HRMS and EI spectra after trimethylsilylation recorded by GC–MS.
Willi Schirmer   +3 more
wiley   +1 more source

A blockchain-based lightweight identity authentication scheme for the IEDs of security and stability control system.

open access: yesPLoS ONE, 2022
As an important part of the second defense line of the power system, the Security and Stability Control System (SSCS) is of great significance to ensure the reliable operation of the power system. However, SSCS still lacks an effective security mechanism
Zhaohan Li   +5 more
doaj   +1 more source

It's Not Just What You Say, but How You Say It: The Effects of Enterprise Social Media on Service Management, Through the Lens of Signaling Theory

open access: yesHuman Resource Management, EarlyView.
ABSTRACT Frontline service workers are crucial to service delivery and have been a long‐standing focus of research, with scholars and practitioners alike maintaining an interest in their effective management. As technology increasingly transforms this context, the way in which managers in service organizations communicate with frontline workers has ...
Alexandra Budjanovcanin, Wei‐Ning Yang
wiley   +1 more source

Challenges and opportunities in mitigating sarcoptic mange in wild South American camelids

open access: yesThe Journal of Wildlife Management, EarlyView.
Wild South American camelids—vicuña and guanaco—face threats from sarcoptic mange, a contagious skin disease linked to severe population declines. Despite its impact, major gaps remain in understanding disease dynamics. This review summarizes current knowledge, identifies key data and management gaps, and outlines urgent actions for effective ...
Alynn M. Martin   +13 more
wiley   +1 more source

Exact Methods for the Split Delivery Vehicle Routing Problem With Two‐Dimensional Loading Constraints

open access: yesNetworks, EarlyView.
ABSTRACT The Split Delivery Vehicle Routing Problem with Two‐dimensional Loading Constraints (2L‐SDVRP) integrates vehicle routing, split delivery, and two‐dimensional packing constraints. In the 2L‐SDVRP, customers can be served by multiple vehicles, and their demands consist of different two‐dimensional rectangular items that must be packed in the ...
Kamyla Maria Ferreira   +4 more
wiley   +1 more source

The cost of Bitcoin mining has never really increased [PDF]

open access: yes, 2020
The Bitcoin network is burning a large amount of energy for mining. In this paper we estimate the lower bound for the global energy cost for a period of ten years from 2010, taking into account changing oil costs, improvements in hashing technologies and
Aste, Tomaso, Song, Yo-Der
core   +1 more source

Home - About - Disclaimer - Privacy