Security-Enhanced Decentralized Content Sharing in Publish/Subscribe System
We consider a content dissemination model, where the contents disseminated from a content source on a regular or event-driven basis are shared among the group members, without directly contacting the content source.
Wang-Seok Park+2 more
doaj +1 more source
The major silk gene, h‐fibroin, was annotated in high‐quality genomes of two unusual case‐making Trichoptera. H‐Fibroin of Limnocentropus insolitus shows a similar amino acid composition to other case‐making species, while the amino acid composition of h‐fibroin of Phryganopsyche brunnea resembles that of retreat‐making species.
Xiling Deng+4 more
wiley +1 more source
The Dependability of Crypto Linked Off-chain File Systems in Backend Blockchain Analytics Engine
This paper presents ways to assure the efficacy of managing crypto links and crypto speed with respect to the dependability of blockchain. The dependability in this work is defined with reference to crypto links in a proportional manner and crypto speed ...
Jongho Seol+4 more
doaj +1 more source
RHINO: Regularizing the Hash-based Implicit Neural Representation [PDF]
The use of Implicit Neural Representation (INR) through a hash-table has demonstrated impressive effectiveness and efficiency in characterizing intricate signals. However, current state-of-the-art methods exhibit insufficient regularization, often yielding unreliable and noisy results during interpolations.
arxiv
Cannabinoids and the Endocannabinoid System in the Treatment of Chronic Rhinosinusitis
The objective of this scoping review is to explore the role of the ECS in the pathophysiology of CRS. We identified five studies, all supporting a common conclusion that the ECS is implicated in regulating cellular inflammatory pathways potentially involved in sinonasal disease.
John J. W. Lee+7 more
wiley +1 more source
Packet-loss robust scalable authentication algorithm for compressed image streaming
Based on structures and dependencies of the image codestreams, a scalable stream-level authentication ap-proach was proposed to resist packet loss. To construct the authentication algorithm by hash chaining and error-correction coding, the proposed ...
Xiao-wei YI+3 more
doaj +2 more sources
A Secure Cooperative Sensing Protocol for Cognitive Radio Networks [PDF]
Cognitive radio networks sense spectrum occupancy and manage themselves to operate in unused bands without disturbing licensed users. Spectrum sensing is more accurate if jointly performed by several reliable nodes. Even though cooperative sensing is an
Garrigues Olivella, Carles+1 more
core
Leveraging Blockchain and Smart Contracts to Combat Greenwashing in Sustainable Development
ABSTRACT Blockchain technology, when combined with smart contracts, enables buyers to distinguish between greenwashed and genuinely eco‐friendly products. The presence of counterfeit items can severely impact supply chains by diminishing brand value, eroding consumer confidence, and undermining market trust.
Ragnhild Silkoset, Arne Nygaard
wiley +1 more source
Atomic Crosschain Transactions for Ethereum Private Sidechains
The Atomic Crosschain Transaction for Ethereum Private Sidechains protocol allows composable programming across permissioned Ethereum blockchains. It allows for inter-contract and inter-blockchain function calls that are both synchronous and atomic: if ...
Peter Robinson+2 more
doaj
CDEdit: A Highly Applicable Redactable Blockchain with Controllable Editing Privilege and Diversified Editing Types [PDF]
Redactable blockchains allow modifiers or voting committees with modification privileges to edit the data on the chain. Trapdoor holders in chameleon-based hash redactable blockchains can quickly compute hash collisions for arbitrary data, and without breaking the link of the hash-chain.
arxiv