Results 191 to 200 of about 15,333 (299)

Hash function security:cryptanalysis of the Very Smooth Hash and multicollisions in generalised iterated hash functions

open access: yes, 2012
Tiivistelmä Viime vuosina digitaaliseen tiedonsiirtoon perustuva tiedonsiirto on yleistynyt valtavasti. Tästä on seurannut monia uusia tietoturvaongelmia. Tässä yhteydessä erityisesti tiedon suojaamiseen käytetyt kryptografiset menetelmät ovat olleet tarkastelun kohteena.
openaire   +1 more source

The American Black Bear (Ursus americanus) as an Apex Predator: Investigating the Ecological Role of the World's Most Abundant Large Carnivore

open access: yesMammal Review, Volume 56, Issue 1, March 2026.
Black bears as apex predators. American black bears can (1) produce top‐down effects on ungulates equal to or exceeding those of typical apex predators and (2) modify the spatiotemporal behaviour of other carnivores, including pumas and coyotes. We argue that the term ‘apex predator’ is highly context dependent and not a species‐wide status.
John M. Nettles   +10 more
wiley   +1 more source

Protocol‐Agnostic Meta Key Distribution for Encrypted Wireless Communications Enabled by Space‐Time‐Coding Metasurface

open access: yesAdvanced Science, Volume 13, Issue 7, 3 February 2026.
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li   +7 more
wiley   +1 more source

Stall‐Free Asynchronous State Repartitioning With a Proactive Workload Tracking Window

open access: yesConcurrency and Computation: Practice and Experience, Volume 38, Issue 3, February 2026.
ABSTRACT High‐throughput stateful applications rely on dynamic data repartitioning to adapt to changing workloads, but this process presents significant challenges. This paper provides a detailed analysis of such challenges, drilling down into the tradeoffs between adaptation, computational overhead, and service availability. We identify that a primary
Douglas Pereira Luiz   +1 more
wiley   +1 more source

Home - About - Disclaimer - Privacy