Results 191 to 200 of about 15,333 (299)
DS-CKDSE: A Dual-Server Conjunctive Keyword Dynamic Searchable Encryption with Forward and Backward Security. [PDF]
Sun H, Liu Y, Zhang Y, Li C.
europepmc +1 more source
Tiivistelmä Viime vuosina digitaaliseen tiedonsiirtoon perustuva tiedonsiirto on yleistynyt valtavasti. Tästä on seurannut monia uusia tietoturvaongelmia. Tässä yhteydessä erityisesti tiedon suojaamiseen käytetyt kryptografiset menetelmät ovat olleet tarkastelun kohteena.
openaire +1 more source
Black bears as apex predators. American black bears can (1) produce top‐down effects on ungulates equal to or exceeding those of typical apex predators and (2) modify the spatiotemporal behaviour of other carnivores, including pumas and coyotes. We argue that the term ‘apex predator’ is highly context dependent and not a species‐wide status.
John M. Nettles +10 more
wiley +1 more source
A Lightweight Authentication and Key Distribution Protocol for XR Glasses Using PUF and Cloud-Assisted ECC. [PDF]
Cha W, Lee HJ, Kook S, Kim K, Won D.
europepmc +1 more source
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li +7 more
wiley +1 more source
Decentralizing video copyright protection: a novel blockchain-enabled framework with performance evaluation. [PDF]
Madapati SL, Pradhan NR.
europepmc +1 more source
Stall‐Free Asynchronous State Repartitioning With a Proactive Workload Tracking Window
ABSTRACT High‐throughput stateful applications rely on dynamic data repartitioning to adapt to changing workloads, but this process presents significant challenges. This paper provides a detailed analysis of such challenges, drilling down into the tradeoffs between adaptation, computational overhead, and service availability. We identify that a primary
Douglas Pereira Luiz +1 more
wiley +1 more source
A scalable post quantum secure blockchain framework with adaptive time consensus in cloud environments. [PDF]
Velmurugan M, Kumar MR.
europepmc +1 more source
Parallelization of Rainbow Tables Generation Using Message Passing Interface: A Study on NTLMv2, MD5, SHA-256 and SHA-512 Cryptographic Hash Functions [PDF]
Mark Vainer +2 more
openalex +1 more source

