Results 81 to 90 of about 2,254,786 (237)
Abstract This paper contributes to the understanding of the complex relationship between British economic performance during the Napoleonic wars and the ‘West Indies’, as the Caribbean slave colonies were called. Not only did profits from slave‐based commerce provide financing for the growth of the financial sector, as has been claimed, but the risk of
Carolyn Sissoko, Mina Ishizu
wiley +1 more source
Efficient incremental hash chain with probabilistic filter-based method to update blockchain light nodes [PDF]
Maher Maalla, Sergey Bezzateev
openalex +1 more source
Multi-Dimensional Hash Chains and Application to Micropayment Schemes [PDF]
One-way hash chains have been used in many micropayment schemes due to their simplicity and efficiency. In this paper we introduce the notion of multi-dimensional hash chains, which is a new generalization of traditional one-way hash chains. We show that this construction has storage-computational complexity of O(logN) per chain element, which is ...
openaire +3 more sources
Under normoxic conditions, the SUMOylated fraction of TFAP2A cannot interact with the Ku70/Ku80 complex, nor it can bind to chromatin. The unSUMOylated fraction pre‐occupies the chromatin of a subset of hypoxia‐induced genes together with the Ku70/Ku80 complex for basal euchromatin formation. Under hypoxic conditions, the SUMOylation equilibrium shifts
Amalia Kanoura+8 more
wiley +1 more source
Intentionality and Attentionality Dynamics in an Institutional Change Process
Abstract In this article, we explore how actors' intentionality emerges, develops, and co‐evolves with institutional change. Although intentions are essential in shaping institutional change agents' motivations and actions, our understanding of their dynamics is limited and biased by the assumption that intentions are usually identifiable prior to ...
Sofiane Baba, Taïeb Hafsi, Omar Hemissi
wiley +1 more source
The application of hash chains and hash structures to cryptography
In this thesis we study how hash chains and other hash structures can be used in various cryptographic applications. In particular we focus on the applications of entity authentication, signatures and key establishment. We study recursive application of hash functions to create hash chains, hash trees and other hash structures. We collate all these to
openaire +3 more sources
How to Govern the Confidence Machine?
ABSTRACT Emerging technologies pose many new challenges for regulation and governance on a global scale. With the advent of distributed communication networks like the Internet and decentralized ledger technologies like blockchain, new platforms emerged, disrupting existing power dynamics and bringing about new claims of sovereignty from the private ...
Primavera de Filippi+2 more
wiley +1 more source
Secure resource metering and accounting with hash chain in cloud storage
Cloud storage is a pay-per-use service of which the billing plan is typically based on users' resource consump-tion metered by server side. Therefore, the trustworthiness between payer and service provider becomes a key factor for the business, and ...
Mei LIU+5 more
doaj +2 more sources
Hash-Chain based Micropayment without Disclosing Privacy Information [PDF]
Yoon-Su Jeong+3 more
openalex +1 more source
A Survey of RFID Authentication Protocols Based on Hash-Chain Method [PDF]
Irfan Syamsuddin+3 more
openalex +1 more source