Results 61 to 70 of about 13,596 (196)
In this paper, we study periodic tridiagonal Toeplitz matrices with perturbed corners. By using some matrix transformations, the Schur complement and matrix decompositions techniques, as well as the Sherman-Morrison-Woodbury formula, we derive explicit ...
Yunlan Wei +3 more
doaj +1 more source
Keystroke Dynamics-Based Authentication Using Unique Keypad
Authentication methods using personal identification number (PIN) and unlock patterns are widely used in smartphone user authentication. However, these authentication methods are vulnerable to shoulder-surfing attacks, and PIN authentication, in ...
Maro Choi +3 more
doaj +1 more source
StorjLedger leverages erasure‐coded sharding and Proof‐of‐Storage to deliver nearly 1000 transactions per second with sub‐second latency, 98% data redundancy, and 76% lower storage costs, resolving the blockchain trilemma by harmonizing scalability, security, and decentralization.
Saha Reno, Koushik Roy
wiley +1 more source
On the number of $N$-free elements with prescribed trace [PDF]
In this paper we derive a formula for the number of $N$-free elements over a finite field $\mathbb{F}_q$ with prescribed trace, in particular trace zero, in terms of Gaussian periods.
Tuxanidy, Aleksandr, Wang, Qiang
core
An Ultra-light PRNG Passing Strict Randomness Tests and Suitable for Low Cost Tags
A pseudo-random number generator for low-cost RFID tags is presented. The scheme is simple, sequential and secure, yet has a high performance. Despite its lowest hardware complexity, our proposal represents a better alternative than previous proposals ...
OZCANHAN, M. H. +2 more
doaj +1 more source
Prime-Field Masking in Hardware and its Soundness against Low-Noise SCA Attacks
A recent study suggests that arithmetic masking in prime fields leads to stronger security guarantees against passive physical adversaries than Boolean masking.
Gaëtan Cassiers +4 more
doaj +1 more source
Application for Determining Repeatability and Reproducibility in an Honest Gauge R&R Study
ABSTRACT The analysis of variance (ANOVA) method and the range method are employed to conduct gauge repeatability and reproducibility studies. While the range method does not account for the statistical nature of the data, unlike the ANOVA method, it is, on the one hand, faster and, on the other hand, simpler to implement.
Alban Petitjean, Olivier Musset
wiley +1 more source
Groups with triangle‐free graphs on p$p$‐regular classes
Abstract Let p$p$ be a prime. In this paper, we classify the p$p$‐structure of those finite p$p$‐separable groups such that, given any three non‐central conjugacy classes of p$p$‐regular elements, two of them necessarily have coprime lengths.
M. J. Felipe +2 more
wiley +1 more source
Fuchs' problem for indecomposable abelian groups
More than 50 years ago, Laszlo Fuchs asked which abelian groups can be the group of units of a commutative ring. Though progress has been made, the question remains open.
Chebolu, Sunil K., Lockridge, Keir
core +1 more source
Kenelm Digby's logic of common and natural notions
Abstract In this article, I take a fresh look at the logic of common and natural notions contained in the Two Treatises published in 1644 by Kenelm Digby (1603–1665). Digby's doctrine of common notions was an attempt to retrofit Aristotelianism in order to bring it out of the shadows of scholasticism and into the age of the new experimental and ...
Mogens Lærke
wiley +1 more source

