Results 191 to 200 of about 159,796 (327)
Chameleon hash function based on SM3 and its applications
The immutability of blockchain technology was known to ensure that once data was added to the chain, it could not be altered, which meant that any harmful information uploaded would continue to exert serious negative impacts. To ensure that on-chain data
ZHAO Xianxin +3 more
doaj
ABSTRACT We perform bibliometric analysis on documents for 255 Regulatory Impact Analyzes (RIAs) prepared by the US Environmental Protection Agency (EPA) from 1980 through 2024. Using a series of automated information extraction methods, we extract references from these documents and match them to bibliographic records.
Tyler A. Scott, Sojeong Kim, Liza Wood
wiley +1 more source
A TCML-based spatiotemporal chaotic one-way Hash function with changeable-parameter
Jiandong Liu +2 more
openalex +1 more source
Abstract As people age, there is a natural decline in cognitive functioning and brain structure. However, the relationship between brain function and cognition in older adults is neither straightforward nor uniform. Instead, it is complex, influenced by multiple factors, and can vary considerably from one person to another.
Monica Baciu, Elise Roger
wiley +1 more source
Abstract This study investigates the role of locality (a task/material‐related variable), demographic factors (age, education, and sex), cognitive capacities (verbal working memory [WM], verbal short‐term memory [STM], speed of processing [SOP], and inhibition), and morphosyntactic category (time reference and grammatical aspect) in verb‐related ...
Marielena Soilemezidi +3 more
wiley +1 more source
A hybrid hash framework for post quantum secure zero knowledge identification. [PDF]
Bhadane S +3 more
europepmc +1 more source
Parallelization of Rainbow Tables Generation Using Message Passing Interface: A Study on NTLMv2, MD5, SHA-256 and SHA-512 Cryptographic Hash Functions [PDF]
Mark Vainer +2 more
openalex +1 more source
BentSign: keyed hash algorithm based on bent Boolean function and chaotic attractor [PDF]
Mihaela Todorova +4 more
openalex +1 more source
High-Throughput and Memory-Efficient Pipeline Key-Value Store Architecture on FPGA. [PDF]
Wang X, Liu L, Li Y.
europepmc +1 more source

