Results 121 to 130 of about 123,825 (281)

GB-hash : Hash Functions Using Groebner Basis

open access: yes, 2010
In this paper we present an improved version of HF-hash, viz., GB-hash : Hash Functions Using Groebner Basis. In case of HF-hash, the compression function consists of 32 polynomials with 64 variables which were taken from the first 32 polynomials of hidden field equations challenge-1 by forcing last 16 variables as 0.
Dey, Dhananjoy   +2 more
openaire   +2 more sources

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

Robust steganographic framework for securing sensitive healthcare data of telemedicine using convolutional neural network

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch   +4 more
wiley   +1 more source

Migration, Repression and Homosexual Sociability in Francoist Spain: An Analysis of the Case Files of the Special Courts of Barcelona (1965–1975)

open access: yesGender &History, EarlyView.
ABSTRACT In Spain, under General Franco's regime, homosexuality was regarded as an antisocial and dangerous behaviour. It was thus pursued both by the police and judicial courts. The Law on Vagrants and Crooks (1954) and, subsequently, the Law on Dangerousness and Social Rehabilitation (1970) constituted the legal mechanisms used by the dictatorship to
Jordi Mas Grau, Rafael Cáceres‐Feria
wiley   +1 more source

Cryptanalysis of some chaos-based keyed hash functions

open access: yesTongxin xuebao, 2011
By employing the methods including statistic analysis,birthday attacks,and so on,the forging attacks and equivalent-key recovering attacks towards a categories keyed hash functions that are based on chaos systems were pro-posed.Meanwhile,the reasons for ...
ZHENG Shi-hui1   +3 more
doaj   +2 more sources

Retirement Savings Incentives for Low‐ and Middle‐Income Individuals: Does Government Funded Matching Change Behaviour?*

open access: yesEconomic Record, EarlyView.
We evaluate a government‐funded matching policy for retirement savings contributions targeted at low‐ and middle‐income individuals. Using a difference‐in‐difference approach, we exploit administrative changes to the Australian Government's retirement contribution matching (co‐contribution) policy to identify the impact of the programme on savings ...
Kristen Sobeck, Robert Breunig
wiley   +1 more source

Fast AES-Based Universal Hash Functions and MACs

open access: yesIACR Transactions on Symmetric Cryptology
Ultra-fast AES round-based software cryptographic authentication/encryption primitives have recently seen important developments, fuelled by the authenticated encryption competition CAESAR and the prospect of future high-profile applications such as ...
Augustin Bariant   +5 more
doaj   +1 more source

Caution Ahead: Numerical Reasoning and Look‐Ahead Bias in AI Models

open access: yesJournal of Accounting Research, EarlyView.
ABSTRACT Recent work within accounting and finance has highlighted that modern AI systems exhibit superhuman performance on a variety of foundational activities within these fields. However, the literature often does not provide economic rationale for why AI models seem to outperform, largely because these models are a black box.
BRADFORD LEVY
wiley   +1 more source

The effect of nearby listings on house sale prices in Sydney: A spatio‐temporal regularization approach

open access: yesReal Estate Economics, EarlyView.
Abstract We estimate the price impact of very nearby concurrently listed properties in the Sydney housing market and assess their competition effects. We apply a hedonic model with spatiotemporal effects regularized via a graph Laplacian prior at the month‐by‐SA2 regional level to seven SA4 subregions of metropolitan Sydney. The model structure enables
Willem P. Sijp, Mengheng Li
wiley   +1 more source

Blockchain technology disruptions: Exploring accounting and auditing academics and practitioners' perception

open access: yesAccounting &Finance, EarlyView.
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy