Results 151 to 160 of about 123,825 (281)
Towards an improved efficient leakage-resilient enhanced private set union. [PDF]
Liu Q, Bae J, Lee JW.
europepmc +1 more source
Özet Fonksiyonları daha çok veri bütünlüğünde ve elektronik imza gibi kimlik doğrulamada kullanılan kriptolojinin en önemli araçlardan biridir. Bu fonksiyonlar, herhangi bir uzunluktaki girdiyi belli özelliklerle sıkıştırarak sabit bir uzunluktaki çıktıya götürler.
openaire +3 more sources
Abstract There is a growing interest in Atlantic salmon (Salmo salar) aquaculture to extend the time fish are reared in freshwater (FW) recirculating aquaculture systems (RAS), producing larger FW salmon that can then be induced to undergo smoltification before transfer into marine net pens for grow‐out and harvest.
Le Thi Hong Gam +5 more
wiley +1 more source
A hybrid hash framework for post quantum secure zero knowledge identification. [PDF]
Bhadane S +3 more
europepmc +1 more source
ABSTRACT The objective of this study was to evaluate welfare and health effects following single and repeated non‐lethal blood sampling from the caudal vasculature of Atlantic salmon. Two experiments were conducted at three different temperatures: a 6‐week freshwater experiment with fish weighing 50–100 g, undergoing up to four blood withdrawals, and a
Harriet Romstad +9 more
wiley +1 more source
A Lightweight IDS Based on Blockchain and Machine Learning for Detecting Physical Attacks in Wireless Sensor Networks. [PDF]
Jabor MS +3 more
europepmc +1 more source
Abstract We assessed the proportion of childhood TBI survivors who experienced favourable or less favourable psychosocial outcomes (defined as less favourable when 20% or more of the sample report difficulties or unmet needs) compared to controls and to explore factors associated with these outcomes at 20 years post‐TBI.
Edith Botchway‐Commey +7 more
wiley +1 more source
Intentionality and Attentionality Dynamics in an Institutional Change Process
Abstract In this article, we explore how actors' intentionality emerges, develops, and co‐evolves with institutional change. Although intentions are essential in shaping institutional change agents' motivations and actions, our understanding of their dynamics is limited and biased by the assumption that intentions are usually identifiable prior to ...
Sofiane Baba, Taïeb Hafsi, Omar Hemissi
wiley +1 more source
Two secure authentication protocols for mitigating vulnerabilities in IoD. [PDF]
Safkhani M, Ghorbani Fard M.
europepmc +1 more source

