Results 61 to 70 of about 91,922 (250)

Fast Verification of Hash Chains [PDF]

open access: yes, 2004
A hash chain is a sequence of hash values x i = hash(x i − 1) for some initial secret value x 0. It allows to reveal the final value x n and to gradually disclose the pre-images x n − 1, x n − 2, ... whenever necessary. The correctness of a given value x i can then be verified by re-computing the chain and comparing the result to x n .
openaire   +2 more sources

Improved PBFT algorithm for high-frequency trading scenarios of alliance blockchain

open access: yesScientific Reports, 2022
With the continuous development of blockchain technology, the application scenarios of alliance blockchain are also increasing. The consensus algorithm can achieve distributed consensus among nodes in the network.
Song Tang   +4 more
doaj   +1 more source

Mining Thermophile Genomes for New PETases with Exceptional Thermostabilities Using Sequence Similarity Networks

open access: yesChemBioChem, EarlyView.
Targeted genome mining identified thermostable enzymes (PETases) that hydrolyze the commonly used plastic polymer polyethylene terephthalate (PET). Thermostable enzymes are identified from thermophilic microbial sources. Experimental results reveal enzymatic activity on authentic PET films, highlighting potential for industrial application.
Zhenyu Hu   +4 more
wiley   +1 more source

Hyperledger Fabric for the (digitalized) lifecycle of construction products: Applied review on fastening technology

open access: yesCivil Engineering Design, Volume 7, Issue 1, Page 9-22, March 2025.
Abstract Blockchain technology is a digital decentralized data ledger recording transactions in an encrypted format. Its implementation can potentially hold significant advantages for the built environment, particularly in manufacturing and building product usage aligned with Building Information Modeling (BIM). This paradigm shift toward decentralized
Aileen Pfeil   +2 more
wiley   +1 more source

Deciphering Important Metabolic Pathways through Reaction Pair Prediction with a Siamese Transformer Network

open access: yesChemistry–Methods, EarlyView.
A deep learning‐based method Siamese transformer reaction pair (STRP) prediction is presented for identifying important pathways in untargeted LC‐MS/MS metabolomics. STRP accurately predicts metabolic reaction pairs from known metabolites and tandem mass spectra of unannotated metabolic features, which enhance the utility of untargeted metabolomics ...
Han Bao   +7 more
wiley   +1 more source

Statistically-secure ORAM with $\tilde{O}(\log^2 n)$ Overhead

open access: yes, 2013
We demonstrate a simple, statistically secure, ORAM with computational overhead $\tilde{O}(\log^2 n)$; previous ORAM protocols achieve only computational security (under computational assumptions) or require $\tilde{\Omega}(\log^3 n)$ overheard.
B. Pinkas   +12 more
core   +1 more source

The Effects of Blockchain Technology on Corporate Governance: Evidence from Emerging Economy

open access: yesManagement Dynamics in the Knowledge Economy, 2022
Modern developments in digitization have completely changed business structures and operating procedures. The core structure of a database can be built using the distributed technology known as blockchain, which combines data blocks and hash chains ...
Grace Osariemen EGHE-IKHURHE   +1 more
doaj  

Annual Banned‐Substance Review 17th Edition—Analytical Approaches in Human Sports Drug Testing 2023/2024

open access: yesDrug Testing and Analysis, EarlyView.
Scenarios of drug exposure and administration as well as detection assays for drugs and methods of sports doping published between 2023 and 2024 are critically reviewed and evaluated in context with the Prohibited List 2024 as established by the World Anti‐Doping Agency.
Mario  Thevis   +2 more
wiley   +1 more source

A secure and lightweight ad-hoc routing algorithm for personal networks [PDF]

open access: yes, 2005
Over the past few years, there has been increasing interest in utilizing Personal Area Networks (PANs) to offer users innovative and personalized services.
Heemstra de Groot, S.M., Jehangir, A.
core   +1 more source

Fair micropayment system based on hash chains

open access: yesTsinghua Science and Technology, 2005
Micropayment schemes usually do not provide fairness, which means that either the customer or the merchant, or both, can cheat each other and gain a financial advantage by misusing the protocols. This paper proposes an efficient hash chain-based micropayment scheme, which is an offline, prepaid scheme that supports simpler divisibility of digital coins.
Weimin Lang, Zongkai Yang, Yunmeng Tan
openaire   +2 more sources

Home - About - Disclaimer - Privacy