Results 91 to 100 of about 61,999 (289)

Quantum Resistant Random Linear Code Based Public Key Encryption Scheme RLCE [PDF]

open access: yes, 2015
Lattice based encryption schemes and linear code based encryption schemes have received extensive attention in recent years since they have been considered as post-quantum candidate encryption schemes.
Wang, Yongge
core   +2 more sources

The Future of Hydrogen‐Powered Aviation: Technologies, Challenges, and a Strategic Roadmap for Sustainable Decarbonization

open access: yesAdvanced Energy and Sustainability Research, EarlyView.
Hydrogen‐powered aviation offers a transformative pathway to zero‐emission flight by eliminating in‐flight CO2 emissions. Key considerations include propulsion systems (fuel cells and hydrogen combustion), cryogenic storage and insulation challenges, infrastructure and cost barriers, and supply‐chain constraints.
Mubasshira   +4 more
wiley   +1 more source

Information and data protection within a RDBMS

open access: yesCondensed Matter Physics, 2008
Security issues for some special large data, such as binary and image files, as well as video and audio files and streams still require a special development, especially for the industrial database systems (Oracle, MS SQL, DB2, etc).
Y. Khmelevsky
doaj   +1 more source

Enkripsi dan Dekripsi File dengan Algoritma Blowfish pada Perangkat Mobile Berbasis Android

open access: yesJurnal Nasional Teknik Elektro, 2016
Cryptography is one of the ways used to secure data in the form of a file with encrypt files so that others are not entitled to know the file is private and confidential.
Siswo Wardoyo   +2 more
doaj   +1 more source

Advancing Circularity in Battery Systems for Renewable Energy: Technologies, Barriers, and Future Directions

open access: yesAdvanced Energy and Sustainability Research, EarlyView.
This article examines strategies to enhance the sustainability of battery systems in renewable energy through circular economy principles. It discusses recycling techniques, modular battery design, second‐life utilization, and regulatory frameworks. Key barriers include inadequate infrastructure and regulatory gaps.
Williams Chibueze Munonye   +5 more
wiley   +1 more source

Product differentiation in the fruit industry: Lessons from trademarked apples

open access: yesAgribusiness, EarlyView.
Abstract We derive price premiums for patented or trademarked apple varieties, also known as “club apples,” compared to open‐variety apples. We use an expansive retail scanner dataset, along with unique data on apple taste characteristics, to estimate monthly club apple premiums for 2008–2018.
Modhurima Dey Amin   +3 more
wiley   +1 more source

IMPLEMENTASI KOMPILASI ALGORITMA KRIPTOGRAFI TRANSPOSISI COLUMNAR DAN RSA UNTUK PENGAMANAN PESAN RAHASIA

open access: yesJurnal informatika UPGRIS, 2019
Data security is important in maintaining the confidentiality of certain data that can only be known by those who have rights. If the data transmission is done by using network, there is a big possibility the data to be known by unauthorized parties ...
Yuza Reswan   +2 more
doaj   +1 more source

Supply chain risk in grain trading: Inventories as real options for shipping grain

open access: yesAgribusiness, EarlyView.
Abstract Integrating trading and logistics is an important challenge in commodity trading. Trading and logistics are strategic decisions and are integral to most commodities including grain shipping by rail, in addition to other modes (barges, ocean shipping). There are substantial risks, such as the ordering and placement of rail cars.
William W. Wilson, Jesse Klebe
wiley   +1 more source

How do both firm‐level resources and country‐level competitiveness shape the relationship between alliance portfolio diversity and radical innovation? A comparison between the food and other manufacturing industries

open access: yesAgribusiness, EarlyView.
Abstract This study examines how European food companies can operationally leverage the value created by strategic alliances into commercially viable products. More importantly, it emphasizes that the effects of alliance portfolio diversity (APD) on radical innovation performance can be achieved not only directly, but also via moderating roles, that is,
María Ancín   +2 more
wiley   +1 more source

A Context-Based Secure Handover Mechanism for Space-Ground-Integrated Network

open access: yesResearch Briefs on Information & Communication Technology Evolution, 2020
This paper suggests a context-based secure handover mechanism for the frequent handover problem of satellite access nodes due to its high-speed motion in Space-Ground-Integrated Network. This approach applies Private Key Generator (PKG) in identity-based
Hang Zhao
doaj   +1 more source

Home - About - Disclaimer - Privacy