Results 61 to 70 of about 1,334,459 (231)

Seluge++: A Secure Over-the-Air Programming Scheme in Wireless Sensor Networks

open access: yesSensors, 2014
Over-the-air dissemination of code updates in wireless sensor networks have been researchers’ point of interest in the last few years, and, more importantly, security challenges toward the remote propagation of code updating have occupied the majority of
Farzan Doroodgar   +2 more
doaj   +1 more source

Intelligent manufacturing security model based on improved blockchain

open access: yesMathematical Biosciences and Engineering, 2020
The Industrial Internet of Things (IIoT) plays an important role in the development of smart factories. However, the existing IIoT systems are prone to suffering from single points of failure and unable to provide stable service.
Jiahe Xu   +3 more
doaj   +1 more source

XML data integrity based on concatenated hash function [PDF]

open access: yes, 2009
Data integrity is the fundamental for data authentication. A major problem for XML data authentication is that signed XML data can be copied to another document but still keep signature valid. This is caused by XML data integrity protecting.
Liu, B, Lu, J, Yip, YJ
core  

A Cryptographic Escrow for Treaty Declarations and Step-by-Step Verification

open access: yes, 2018
The verification of arms-control and disarmament agreements requires states to provide declarations, including information on sensitive military sites and assets.
Felten, Edward W.   +2 more
core   +1 more source

Identification of Ecological Corridors for Semi‐Aquatic Vertebrates: A Case of the Eurasian Otter in Northeast China

open access: yesEcology and Evolution, Volume 15, Issue 11, November 2025.
This study employed species distribution models and corridor construction models to predict the distribution range of suitable habitats and identify the ecological corridors and key points for the Eurasian otter in Northeast China. There were 39 core habitats, 42 ecological corridors, 78 pinch points and 19 barrier points identified. Among these, 11.92%
Qingyi Wang   +5 more
wiley   +1 more source

Analysis of the Communication Traffic for Blockchain Synchronization of IoT Devices

open access: yes, 2018
Blockchain is a technology uniquely suited to support massive number of transactions and smart contracts within the Internet of Things (IoT) ecosystem, thanks to the decentralized accounting mechanism.
Danzi, Pietro   +3 more
core   +1 more source

Interdisciplinary approaches to enhance sensory properties and consumer acceptance in pulse crops

open access: yesPLANTS, PEOPLE, PLANET, Volume 7, Issue 6, Page 1639-1656, November 2025.
Enhancing the flavor profile of pulse crops such as chickpea, dry pea, and lentil is essential for increasing human acceptance of plant‐based diets. Despite their nutritional value, undesirable sensory attributes of pulses, including off‐flavors and bitterness, reduce consumer acceptance.
Chamodi Senarathne, Dil Thavarajah
wiley   +1 more source

Smart Forest Modeling Behavioral for a Greener Future: An AI Text-by-Voice Blockchain Approach with Citizen Involvement in Sustainable Forestry Functionality

open access: yesFinTech
This paper introduces a novel approach to tree modeling architecture integrated with blockchain technology, aimed at enhancing landscape spatial planning and forest monitoring systems.
Dimitrios Varveris   +3 more
doaj   +1 more source

Peer-to-Peer EnergyTrade: A Distributed Private Energy Trading Platform

open access: yes, 2018
Blockchain is increasingly being used as a distributed, anonymous, trustless framework for energy trading in smart grids. However, most of the existing solutions suffer from reliance on Trusted Third Parties (TTP), lack of privacy, and traffic and ...
Dong, Zhao Yang   +5 more
core   +1 more source

Bridging the Gap: Achieving Seamless Interoperability Between Ethereum‐Based Blockchains Using Inter‐Blockchain Communication Protocols

open access: yesSoftware: Practice and Experience, Volume 55, Issue 11, Page 1749-1772, November 2025.
ABSTRACT Introduction The popularization of blockchain‐based applications made evident a critical challenge, namely the inherent isolation of these decentralized systems, akin to the disconnected and technologically diverse local area networks of the 1970s. This lack of interoperability limits the potential for widespread adoption and innovation in the
Christian Delgado‐von‐Eitzen   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy