Results 101 to 110 of about 10,638,853 (320)

An efficient and secure technique for image steganography using a hash function. [PDF]

open access: yesPeerJ Comput Sci, 2022
Nezami ZI   +5 more
europepmc   +1 more source

PPP-Completeness with Connections to Cryptography [PDF]

open access: yes, 2018
Polynomial Pigeonhole Principle (PPP) is an important subclass of TFNP with profound connections to the complexity of the fundamental cryptographic primitives: collision-resistant hash functions and one-way permutations.
Sotiraki, Katerina   +2 more
core   +1 more source

A Digital Phantom for MR Spectroscopy Data Simulation

open access: yesMagnetic Resonance in Medicine, EarlyView.
ABSTRACT Purpose Simulated data is increasingly valued by researchers for validating MRS processing and analysis algorithms. However, there is no consensus on the optimal approaches for simulation models and parameters. This study introduces a novel MRS digital brain phantom framework, providing a comprehensive and modular foundation for MRS data ...
D. M. J. van de Sande   +11 more
wiley   +1 more source

Verification of Implementations of Cryptographic Hash Functions

open access: yesIEEE Access, 2017
Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important properties that affect the security and ...
Dexi Wang   +5 more
doaj   +1 more source

Research progress in the application of single‐cell sequencing technology in rheumatic diseases

open access: yesRheumatology &Autoimmunity, EarlyView.
Application of single‐cell RNA sequencing (scRNA‐seq) technology in the study of the pathogenesis of rheumatic diseases. Tree of content illustration depicting the multi‐layered insights from scRNA‐seq in rheumatic diseases. The outer layer highlights key cell subsets identified by scRNA‐seq in rheumatoid arthritis, systemic lupus erythematosus ...
Xinzhe Feng   +5 more
wiley   +1 more source

Quantum search for scaled hash function preimages [PDF]

open access: hybrid, 2021
Sergi Ramos-Calderer   +4 more
openalex   +1 more source

Smart Waste, Smarter World: Exploring Waste Types, Trends, and Tech‐Driven Valorization Through Artificial Intelligence, Internet of Things, and Blockchain

open access: yesSustainable Development, EarlyView.
ABSTRACT Global municipal solid waste generation is projected to exceed 3.8 billion tonnes annually by 2050. This makes the need for smart, inclusive, and scalable waste valorization systems more urgent than ever. This review critically explores the shift from conventional waste management to intelligent, technology‐driven solutions aligned with ...
Segun E. Ibitoye   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy