Results 91 to 100 of about 61,999 (289)
Quantum Resistant Random Linear Code Based Public Key Encryption Scheme RLCE [PDF]
Lattice based encryption schemes and linear code based encryption schemes have received extensive attention in recent years since they have been considered as post-quantum candidate encryption schemes.
Wang, Yongge
core +2 more sources
Hydrogen‐powered aviation offers a transformative pathway to zero‐emission flight by eliminating in‐flight CO2 emissions. Key considerations include propulsion systems (fuel cells and hydrogen combustion), cryogenic storage and insulation challenges, infrastructure and cost barriers, and supply‐chain constraints.
Mubasshira +4 more
wiley +1 more source
Information and data protection within a RDBMS
Security issues for some special large data, such as binary and image files, as well as video and audio files and streams still require a special development, especially for the industrial database systems (Oracle, MS SQL, DB2, etc).
Y. Khmelevsky
doaj +1 more source
Enkripsi dan Dekripsi File dengan Algoritma Blowfish pada Perangkat Mobile Berbasis Android
Cryptography is one of the ways used to secure data in the form of a file with encrypt files so that others are not entitled to know the file is private and confidential.
Siswo Wardoyo +2 more
doaj +1 more source
This article examines strategies to enhance the sustainability of battery systems in renewable energy through circular economy principles. It discusses recycling techniques, modular battery design, second‐life utilization, and regulatory frameworks. Key barriers include inadequate infrastructure and regulatory gaps.
Williams Chibueze Munonye +5 more
wiley +1 more source
Product differentiation in the fruit industry: Lessons from trademarked apples
Abstract We derive price premiums for patented or trademarked apple varieties, also known as “club apples,” compared to open‐variety apples. We use an expansive retail scanner dataset, along with unique data on apple taste characteristics, to estimate monthly club apple premiums for 2008–2018.
Modhurima Dey Amin +3 more
wiley +1 more source
Data security is important in maintaining the confidentiality of certain data that can only be known by those who have rights. If the data transmission is done by using network, there is a big possibility the data to be known by unauthorized parties ...
Yuza Reswan +2 more
doaj +1 more source
Supply chain risk in grain trading: Inventories as real options for shipping grain
Abstract Integrating trading and logistics is an important challenge in commodity trading. Trading and logistics are strategic decisions and are integral to most commodities including grain shipping by rail, in addition to other modes (barges, ocean shipping). There are substantial risks, such as the ordering and placement of rail cars.
William W. Wilson, Jesse Klebe
wiley +1 more source
Abstract This study examines how European food companies can operationally leverage the value created by strategic alliances into commercially viable products. More importantly, it emphasizes that the effects of alliance portfolio diversity (APD) on radical innovation performance can be achieved not only directly, but also via moderating roles, that is,
María Ancín +2 more
wiley +1 more source
A Context-Based Secure Handover Mechanism for Space-Ground-Integrated Network
This paper suggests a context-based secure handover mechanism for the frequent handover problem of satellite access nodes due to its high-speed motion in Space-Ground-Integrated Network. This approach applies Private Key Generator (PKG) in identity-based
Hang Zhao
doaj +1 more source

