Results 71 to 80 of about 7,578 (241)

Generalized Hash Chain Traversal with Selective Output

open access: yesIEICE Transactions on Information and Systems, 2010
A hash chain H for a one-way hash function h(·) is a sequence of hash values , where v0 is a public value, vn a secret value, and vi =h(vi+1). A hash chain traversal algorithm T computes and outputs the hash chain H, returning vi in time period (called round) i for 1 ≤ i ≤ n.
Yum, DH, Seo, JW, Cho, K, Lee, PJ
openaire   +3 more sources

Using miniaturized laboratory equipment and DNA barcoding to improve conservation genetics training and identify illegally traded species

open access: yesConservation Biology, EarlyView.
Abstract Illegal wildlife trade (IWT) is one of the largest global illegal activities, and it negatively affects biodiversity and sustainable development worldwide. DNA barcoding coupled with high‐throughput sequencing (i.e., metabarcoding) is useful in identifying taxa affected by IWT and has been used routinely for decades.
Maria Joana Ferreira da Silva   +9 more
wiley   +1 more source

A secure dynamic cross-chain decentralized data consistency verification model

open access: yesJournal of King Saud University: Computer and Information Sciences
The continuous increase in the number of transactions is exerting significant pressure on the storage capacity of blockchains. By storing data on multiple blockchains and interacting with each other with cross-chain technology, the storage pressure can ...
Jiahao Zhao   +4 more
doaj   +1 more source

A link between increased temperature and avian body condition in a logged tropical forest

open access: yesConservation Biology, EarlyView.
Abstract The combined effects of anthropogenic disturbances, such as logging and climate change, remain poorly understood; yet, they are the main threats to tropical biodiversity. Most tropical African countries lack long‐term climate data, so climate impacts on biodiversity cannot be assessed.
Moreen Uwimbabazi   +7 more
wiley   +1 more source

Secure energy efficient routing protocol for wireless sensor network

open access: yesFoundations of Computing and Decision Sciences, 2016
The ease of deployment of economic sensor networks has always been a boon to disaster management applications. However, their vulnerability to a number of security threats makes communication a challenging task.
Das Ayan Kumar   +2 more
doaj   +1 more source

An Economic Analysis of Difficulty Adjustment Algorithms in Proof‐of‐Work Blockchain Systems

open access: yesInternational Economic Review, EarlyView.
ABSTRACT We study the stability of cryptocurrency systems through difficulty adjustment. Bitcoin's difficulty adjustment algorithm (DAA) exhibits instability when the reward elasticity of the hash rate is high, implying that a sharp price reduction could disrupt the current Bitcoin system.
Shunya Noda   +2 more
wiley   +1 more source

Intentionality and Attentionality Dynamics in an Institutional Change Process

open access: yesJournal of Management Studies, EarlyView.
Abstract In this article, we explore how actors' intentionality emerges, develops, and co‐evolves with institutional change. Although intentions are essential in shaping institutional change agents' motivations and actions, our understanding of their dynamics is limited and biased by the assumption that intentions are usually identifiable prior to ...
Sofiane Baba, Taïeb Hafsi, Omar Hemissi
wiley   +1 more source

The Drivers of Science Referenced in US EPA Regulatory Impact Analyses: Open Access, Professional Popularity, and Agency Involvement

open access: yesRegulation &Governance, EarlyView.
ABSTRACT We perform bibliometric analysis on documents for 255 Regulatory Impact Analyzes (RIAs) prepared by the US Environmental Protection Agency (EPA) from 1980 through 2024. Using a series of automated information extraction methods, we extract references from these documents and match them to bibliographic records.
Tyler A. Scott, Sojeong Kim, Liza Wood
wiley   +1 more source

Home - About - Disclaimer - Privacy