Results 41 to 50 of about 1,334,459 (231)

BlockTrainHK: An online learning game for experiencing blockchain concepts

open access: yesSoftwareX, 2022
Although blockchain is regarded as a promising and revolutionary technology, not everyone, particular non-technical students, can effectively understand and appraise its mechanism.
Yung Po Tsang   +2 more
doaj   +1 more source

A secure over-the-air programming scheme in wireless sensor networks [PDF]

open access: yes, 2013
Over-The-Air dissemination of code updates in Wireless Sensor Networks (WSNs) have been researchers’ point of interest in past a few years and more importantly security challenges toward remote propagation of code update have taken the majority of ...
Hezaveh, Farzan Doroodgar
core  

Lattice-Based Group Signatures: Achieving Full Dynamicity (and Deniability) with Ease

open access: yes, 2018
In this work, we provide the first lattice-based group signature that offers full dynamicity (i.e., users have the flexibility in joining and leaving the group), and thus, resolve a prominent open problem posed by previous works.
Ling, San   +3 more
core   +1 more source

An Improved Transformation System for Molecular Biology Research in Peach Fruit

open access: yesFuture Postharvest and Food, EarlyView.
Schematic Diagram of Repeated Agrobacterium‐Mediated Transformation. A triple‐stage on‐tree Agrobacterium injection enables gene manipulation in peach with up to 32‐day expression, supporting efficient, nonheritable functional analysis without tissue culture.
Chunhong Li   +7 more
wiley   +1 more source

Enhancing MQTT security for internet of things: Lightweight two-way authorization and authentication with advanced security measures

open access: yesMeasurement: Sensors
The MQTT (Message Queuing Telemetry Transport) protocol used the pub-sub model for IoT communication. Bolstering security with two-way authentication becomes a critical necessity.
Pallavi S. Bangare, Kishor P. Patil
doaj   +1 more source

An efficient full dynamic group signature scheme over ring

open access: yesCybersecurity, 2019
The group signature scheme is an important primitive in cryptography, it allows members in a group to generate signatures anonymously on behalf of the whole group.
Yiru Sun, Yanyan Liu, Bo Wu
doaj   +1 more source

Deep learning‐based ecological analysis of camera trap images is impacted by training data quality and quantity

open access: yesRemote Sensing in Ecology and Conservation, EarlyView.
Machine learning image classifiers are increasingly being used to automate camera trap image labelling, but we don't know how much ML model accuracy matters for downstream ecological analyses. Using two large data sets from an African savannah and an Asian dry forest ecosystem, we compared human labelled data with predictions from deep‐learning models ...
Peggy A. Bevan   +12 more
wiley   +1 more source

Effective privacy preserving in cloud computing using position aware Merkle tree model

open access: yesBulletin of Electrical Engineering and Informatics
In this research manuscript, a new protocol is proposed for predicting the available space in the cloud and verifying the security of stored data. The protocol is utilized for learning the available data, and based on this learning, the available storage
Shruthi Gangadharaiah   +1 more
semanticscholar   +1 more source

Unraveling the impact of dog‐friendly spaces on urban–wildland pumas and other wildlife

open access: yesWildlife Biology, EarlyView.
As the most widespread large carnivore on the planet, domestic dogs Canis lupus familiaris can pose a major threat to wildlife, even within protected areas (PAs). Growing human presence in PAs, coupled with increasing pet dog ownership underscores the urgency to understand the influence of dogs on wildlife activity and health.
Alys Granados   +3 more
wiley   +1 more source

Data management method for building internet of things based on blockchain sharding and DAG

open access: yesInternet of Things and Cyber-Physical Systems
Sharding technology can address the throughput and scalability limitations that arise when single-chain blockchain are applied in the Internet of Things (IoT).
Wenhu Zheng   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy