Results 81 to 90 of about 72,170 (255)

RBAU: Noval Redactable Model with Audit Mechanism and Key Update for Alliance Chain

open access: yesMathematics
With the widespread application of alliance chain technology in diverse scenarios, its immutability has gradually revealed certain limitations in practical use.
Yineng Chen   +6 more
doaj   +1 more source

Blockchain technology disruptions: Exploring accounting and auditing academics and practitioners' perception

open access: yesAccounting &Finance, EarlyView.
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo   +3 more
wiley   +1 more source

BlockChain (BC), Technology Notary in Data Driven Marketing (DDM) Contracts [PDF]

open access: yesOvidius University Annals: Economic Sciences Series, 2021
Today, Data Driven Marketing is challenged by the supply of vague data, inconsistencies between them and fraud through advertising in the digital marketing ecosystem.
Ermal Haxhiaj, Bia Çera
doaj  

Identification of MEF2A, MEF2C, and MEF2D interactomes in basal and Fsk‐stimulated mouse MA‐10 Leydig cells

open access: yesAndrology, EarlyView.
Abstract Background Myocyte enhancer factor 2 transcription factors regulate essential transcriptional programs in various cell types. The activity of myocyte enhancer factor 2 factors is modulated through interactions with cofactors, chromatin remodelers, and other regulatory proteins, which are dependent on cell context and physiological state.
Karine de Mattos   +4 more
wiley   +1 more source

Secure energy efficient routing protocol for wireless sensor network

open access: yesFoundations of Computing and Decision Sciences, 2016
The ease of deployment of economic sensor networks has always been a boon to disaster management applications. However, their vulnerability to a number of security threats makes communication a challenging task.
Das Ayan Kumar   +2 more
doaj   +1 more source

Generalized Hash Chain Traversal with Selective Output

open access: yesIEICE Transactions on Information and Systems, 2010
A hash chain H for a one-way hash function h(·) is a sequence of hash values , where v0 is a public value, vn a secret value, and vi =h(vi+1). A hash chain traversal algorithm T computes and outputs the hash chain H, returning vi in time period (called round) i for 1 ≤ i ≤ n.
Yum, DH, Seo, JW, Cho, K, Lee, PJ
openaire   +3 more sources

A link between increased temperature and avian body condition in a logged tropical forest

open access: yesConservation Biology, EarlyView.
Abstract The combined effects of anthropogenic disturbances, such as logging and climate change, remain poorly understood; yet, they are the main threats to tropical biodiversity. Most tropical African countries lack long‐term climate data, so climate impacts on biodiversity cannot be assessed.
Moreen Uwimbabazi   +7 more
wiley   +1 more source

A secure dynamic cross-chain decentralized data consistency verification model

open access: yesJournal of King Saud University: Computer and Information Sciences
The continuous increase in the number of transactions is exerting significant pressure on the storage capacity of blockchains. By storing data on multiple blockchains and interacting with each other with cross-chain technology, the storage pressure can ...
Jiahao Zhao   +4 more
doaj   +1 more source

Research on trusted DNP3-BAE protocol based on hash chain

open access: yesEURASIP Journal on Wireless Communications and Networking, 2018
To solve the security problem of industrial Ethernet DNP3 protocol broadcast authentication, the attack vector and security requirements of trusted DNP3 protocol are analysed.
Ye Lu, Tao Feng
doaj   +1 more source

Combining Blockchain and Swarm Robotics to Deploy Surveillance Missions [PDF]

open access: yes, 2019
Current swarm robotics systems are not utilized as frequently in surveillance missions due to the limitations of the existing distributed systems\u27 designs.
Razavi, Ardalan
core   +1 more source

Home - About - Disclaimer - Privacy