Results 61 to 70 of about 91,922 (250)
Fast Verification of Hash Chains [PDF]
A hash chain is a sequence of hash values x i = hash(x i − 1) for some initial secret value x 0. It allows to reveal the final value x n and to gradually disclose the pre-images x n − 1, x n − 2, ... whenever necessary. The correctness of a given value x i can then be verified by re-computing the chain and comparing the result to x n .
openaire +2 more sources
Improved PBFT algorithm for high-frequency trading scenarios of alliance blockchain
With the continuous development of blockchain technology, the application scenarios of alliance blockchain are also increasing. The consensus algorithm can achieve distributed consensus among nodes in the network.
Song Tang+4 more
doaj +1 more source
Targeted genome mining identified thermostable enzymes (PETases) that hydrolyze the commonly used plastic polymer polyethylene terephthalate (PET). Thermostable enzymes are identified from thermophilic microbial sources. Experimental results reveal enzymatic activity on authentic PET films, highlighting potential for industrial application.
Zhenyu Hu+4 more
wiley +1 more source
Abstract Blockchain technology is a digital decentralized data ledger recording transactions in an encrypted format. Its implementation can potentially hold significant advantages for the built environment, particularly in manufacturing and building product usage aligned with Building Information Modeling (BIM). This paradigm shift toward decentralized
Aileen Pfeil+2 more
wiley +1 more source
A deep learning‐based method Siamese transformer reaction pair (STRP) prediction is presented for identifying important pathways in untargeted LC‐MS/MS metabolomics. STRP accurately predicts metabolic reaction pairs from known metabolites and tandem mass spectra of unannotated metabolic features, which enhance the utility of untargeted metabolomics ...
Han Bao+7 more
wiley +1 more source
Statistically-secure ORAM with $\tilde{O}(\log^2 n)$ Overhead
We demonstrate a simple, statistically secure, ORAM with computational overhead $\tilde{O}(\log^2 n)$; previous ORAM protocols achieve only computational security (under computational assumptions) or require $\tilde{\Omega}(\log^3 n)$ overheard.
B. Pinkas+12 more
core +1 more source
The Effects of Blockchain Technology on Corporate Governance: Evidence from Emerging Economy
Modern developments in digitization have completely changed business structures and operating procedures. The core structure of a database can be built using the distributed technology known as blockchain, which combines data blocks and hash chains ...
Grace Osariemen EGHE-IKHURHE+1 more
doaj
Scenarios of drug exposure and administration as well as detection assays for drugs and methods of sports doping published between 2023 and 2024 are critically reviewed and evaluated in context with the Prohibited List 2024 as established by the World Anti‐Doping Agency.
Mario Thevis+2 more
wiley +1 more source
A secure and lightweight ad-hoc routing algorithm for personal networks [PDF]
Over the past few years, there has been increasing interest in utilizing Personal Area Networks (PANs) to offer users innovative and personalized services.
Heemstra de Groot, S.M., Jehangir, A.
core +1 more source
Fair micropayment system based on hash chains
Micropayment schemes usually do not provide fairness, which means that either the customer or the merchant, or both, can cheat each other and gain a financial advantage by misusing the protocols. This paper proposes an efficient hash chain-based micropayment scheme, which is an offline, prepaid scheme that supports simpler divisibility of digital coins.
Weimin Lang, Zongkai Yang, Yunmeng Tan
openaire +2 more sources