Results 121 to 130 of about 154,141 (333)
Beyond Supply and Demand: The Moral Economy of Price Formation in Slab City
ABSTRACT This article investigates the unique economic practices of Slab City, California, an off‐grid community that rejects mainstream US values. Despite operating within the broader US economic system, Slab City residents have developed alternative forms of exchange, using cigarettes and cannabis alongside US dollars.
Bailey C. Hauswurz
wiley +1 more source
Spatiotemporal chaotic one-way Hash function construction based on coupled tent maps
A novel coupled tent maps-based spatiotemporal chaotic cryptographic Hash function was proposed.Compared with the discrete tent map,the coupled discrete tent spatiotemporal chaotic maps have longer computer-realization-period,nearly uniform distribution ...
LIU Jian-dong, FU Xiu-li
doaj +2 more sources
A Pt‐Fe‐Sn alloy catalyst supported on activated carbon is synthesized via laser synthesis in liquid, introducing lattice distortions that enhance active site exposure and toluene desorption. The catalyst achieves a hydrogen evolution rate of 2625 mmol gPt⁻¹ min⁻¹ with 99.96% selectivity and excellent stability, offering a promising strategy for ...
Zheng Wang +5 more
wiley +1 more source
Using Hash Functions as a Hedge against Chosen Ciphertext Attack [PDF]
Victor Shoup
openalex +1 more source
A Risk Manager for Intrusion Tolerant Systems: Enhancing HAL 9000 With New Scoring and Data Sources
ABSTRACT Background Intrusion Tolerant Systems (ITS) aim to maintain system security despite adversarial presence by limiting the impact of successful attacks. Current ITS risk managers rely heavily on public databases like NVD and Exploit DB, which suffer from long delays in vulnerability evaluation, reducing system responsiveness. Objective This work
Tadeu Freitas +6 more
wiley +1 more source
A Composition Theorem for Universal One-Way Hash Functions [PDF]
Victor Shoup
openalex +1 more source
Blockchain and Digital Technologies in the Telecommunications Industry
ABSTRACT This article examines how fourth industrial revolution (4IR) technologies, specifically blockchain and digital twin technologies, can be utilized to address the energy supply challenge and enhance the management of distributed telecom infrastructure assets in a research context.
Charles Okeyia +3 more
wiley +1 more source
Making Hash Functions from Block Ciphers Secure and Efficient by Using Convolutional Codes [PDF]
Toru Inoue, Kouichi Sakurai
openalex +1 more source
Our study presents a tumour‐informed circulating tumour DNA (ctDNA) workflow designed to enhance the detection of recurrence in head and neck cancer patients, addressing key challenges such as low ctDNA tumour fractions and tumour heterogeneity. Abstract Circulating tumour DNA (ctDNA) is a promising minimally invasive biomarker for monitoring treatment
Xiaomin Huang +8 more
wiley +1 more source
The power of primes: security of authentication based on a universal hash-function family
Message authentication codes (MACs) based on universal hash-function families are becoming increasingly popular due to their fast implementation. In this paper, we investigate a family of universal hash functions that has been appeared repeatedly in the ...
Alomair Basel +2 more
doaj +1 more source

