Results 41 to 50 of about 1,334,459 (231)
BlockTrainHK: An online learning game for experiencing blockchain concepts
Although blockchain is regarded as a promising and revolutionary technology, not everyone, particular non-technical students, can effectively understand and appraise its mechanism.
Yung Po Tsang +2 more
doaj +1 more source
A secure over-the-air programming scheme in wireless sensor networks [PDF]
Over-The-Air dissemination of code updates in Wireless Sensor Networks (WSNs) have been researchers’ point of interest in past a few years and more importantly security challenges toward remote propagation of code update have taken the majority of ...
Hezaveh, Farzan Doroodgar
core
Lattice-Based Group Signatures: Achieving Full Dynamicity (and Deniability) with Ease
In this work, we provide the first lattice-based group signature that offers full dynamicity (i.e., users have the flexibility in joining and leaving the group), and thus, resolve a prominent open problem posed by previous works.
Ling, San +3 more
core +1 more source
An Improved Transformation System for Molecular Biology Research in Peach Fruit
Schematic Diagram of Repeated Agrobacterium‐Mediated Transformation. A triple‐stage on‐tree Agrobacterium injection enables gene manipulation in peach with up to 32‐day expression, supporting efficient, nonheritable functional analysis without tissue culture.
Chunhong Li +7 more
wiley +1 more source
The MQTT (Message Queuing Telemetry Transport) protocol used the pub-sub model for IoT communication. Bolstering security with two-way authentication becomes a critical necessity.
Pallavi S. Bangare, Kishor P. Patil
doaj +1 more source
An efficient full dynamic group signature scheme over ring
The group signature scheme is an important primitive in cryptography, it allows members in a group to generate signatures anonymously on behalf of the whole group.
Yiru Sun, Yanyan Liu, Bo Wu
doaj +1 more source
Machine learning image classifiers are increasingly being used to automate camera trap image labelling, but we don't know how much ML model accuracy matters for downstream ecological analyses. Using two large data sets from an African savannah and an Asian dry forest ecosystem, we compared human labelled data with predictions from deep‐learning models ...
Peggy A. Bevan +12 more
wiley +1 more source
Effective privacy preserving in cloud computing using position aware Merkle tree model
In this research manuscript, a new protocol is proposed for predicting the available space in the cloud and verifying the security of stored data. The protocol is utilized for learning the available data, and based on this learning, the available storage
Shruthi Gangadharaiah +1 more
semanticscholar +1 more source
Unraveling the impact of dog‐friendly spaces on urban–wildland pumas and other wildlife
As the most widespread large carnivore on the planet, domestic dogs Canis lupus familiaris can pose a major threat to wildlife, even within protected areas (PAs). Growing human presence in PAs, coupled with increasing pet dog ownership underscores the urgency to understand the influence of dogs on wildlife activity and health.
Alys Granados +3 more
wiley +1 more source
Data management method for building internet of things based on blockchain sharding and DAG
Sharding technology can address the throughput and scalability limitations that arise when single-chain blockchain are applied in the Internet of Things (IoT).
Wenhu Zheng +6 more
doaj +1 more source

