Results 71 to 80 of about 2,338,489 (263)

LightChain: A DHT-based Blockchain for Resource Constrained Environments [PDF]

open access: yes, 2019
As an append-only distributed database, blockchain is utilized in a vast variety of applications including the cryptocurrency and Internet-of-Things (IoT).
Hassanzadeh-Nazarabadi, Yahya   +2 more
core   +1 more source

Fair micropayment system based on hash chains

open access: yesTsinghua Science and Technology, 2005
Micropayment schemes usually do not provide fairness, which means that either the customer or the merchant, or both, can cheat each other and gain a financial advantage by misusing the protocols. This paper proposes an efficient hash chain-based micropayment scheme, which is an offline, prepaid scheme that supports simpler divisibility of digital coins.
Weimin Lang, Zongkai Yang, Yunmeng Tan
openaire   +2 more sources

Cannabinoids and the Endocannabinoid System in the Treatment of Chronic Rhinosinusitis

open access: yesThe Laryngoscope, EarlyView.
The objective of this scoping review is to explore the role of the ECS in the pathophysiology of CRS. We identified five studies, all supporting a common conclusion that the ECS is implicated in regulating cellular inflammatory pathways potentially involved in sinonasal disease.
John J. W. Lee   +7 more
wiley   +1 more source

Exact Methods for the Split Delivery Vehicle Routing Problem With Two‐Dimensional Loading Constraints

open access: yesNetworks, EarlyView.
ABSTRACT The Split Delivery Vehicle Routing Problem with Two‐dimensional Loading Constraints (2L‐SDVRP) integrates vehicle routing, split delivery, and two‐dimensional packing constraints. In the 2L‐SDVRP, customers can be served by multiple vehicles, and their demands consist of different two‐dimensional rectangular items that must be packed in the ...
Kamyla Maria Ferreira   +4 more
wiley   +1 more source

Decentralized Trusted Timestamping using the Crypto Currency Bitcoin

open access: yes, 2015
Trusted timestamping is a process for proving that certain information existed at a given point in time. This paper presents a trusted timestamping concept and its implementation in form of a web-based service that uses the decentralized Bitcoin block ...
Gernandt, André   +2 more
core   +2 more sources

Leveraging Blockchain and Smart Contracts to Combat Greenwashing in Sustainable Development

open access: yesSustainable Development, EarlyView.
ABSTRACT Blockchain technology, when combined with smart contracts, enables buyers to distinguish between greenwashed and genuinely eco‐friendly products. The presence of counterfeit items can severely impact supply chains by diminishing brand value, eroding consumer confidence, and undermining market trust.
Ragnhild Silkoset, Arne Nygaard
wiley   +1 more source

A secure and lightweight ad-hoc routing algorithm for personal networks [PDF]

open access: yes, 2005
Over the past few years, there has been increasing interest in utilizing Personal Area Networks (PANs) to offer users innovative and personalized services.
Heemstra de Groot, S.M., Jehangir, A.
core   +1 more source

Conductive Hydrogel‐Based Neural Interfaces: From Fabrication Methods, Properties, to Applications

open access: yesSmall Structures, EarlyView.
This review summarizes the fabrication methods, properties, and applications of conductive hydrogels in neural interfaces. Finally, the prevailing challenges and outlines of future directions in the field of conductive hydrogels for neural interfaces are provided, emphasizing the need for interdisciplinary research to address issues such as long‐term ...
Xin‐Yu Xue   +10 more
wiley   +1 more source

Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) [PDF]

open access: yes, 2013
A widespread security claim of the Bitcoin system, presented in the original Bitcoin white-paper, states that the security of the system is guaranteed as long as there is no attacker in possession of half or more of the total computational power used to ...
Bahack, Lear
core   +1 more source

Secure energy efficient routing protocol for wireless sensor network

open access: yesFoundations of Computing and Decision Sciences, 2016
The ease of deployment of economic sensor networks has always been a boon to disaster management applications. However, their vulnerability to a number of security threats makes communication a challenging task.
Das Ayan Kumar   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy