Results 101 to 110 of about 319,858 (317)

Mutual authenticated quantum no-key encryption scheme over private quantum channel [PDF]

open access: yesarXiv, 2015
We realize shamir's no-key protocol via quantum computation of Boolean permutation and private quantum channel. The quantum no-key (QNK) protocol presented here is one with mutual authentications, and proved to be unconditionally secure. An important property of this protocol is that0 its authentication key can be reused permanently.
arxiv  

Symmetric Key Cryptography: Technological Developments in the Field

open access: yes, 2015
This paper presents the various developments and emerging trends in the symmetric key cryptography technique. It provides an overview of latest inventions and approaches that are implemented in the recent scenario for the betterment of private key ...
Md. Sarfaraz Iqbal   +2 more
semanticscholar   +1 more source

Supply chain risk in grain trading: Inventories as real options for shipping grain

open access: yesAgribusiness, EarlyView.
Abstract Integrating trading and logistics is an important challenge in commodity trading. Trading and logistics are strategic decisions and are integral to most commodities including grain shipping by rail, in addition to other modes (barges, ocean shipping). There are substantial risks, such as the ordering and placement of rail cars.
William W. Wilson, Jesse Klebe
wiley   +1 more source

BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets [PDF]

open access: yesarXiv, 2018
Cryptocurrency wallets store the wallets private key(s), and hence, are a lucrative target for attackers. With possession of the private key, an attacker virtually owns all of the currency in the compromised wallet. Managing cryptocurrency wallets offline, in isolated ('air-gapped') computers, has been suggested in order to secure the private keys from
arxiv  

How do both firm‐level resources and country‐level competitiveness shape the relationship between alliance portfolio diversity and radical innovation? A comparison between the food and other manufacturing industries

open access: yesAgribusiness, EarlyView.
Abstract This study examines how European food companies can operationally leverage the value created by strategic alliances into commercially viable products. More importantly, it emphasizes that the effects of alliance portfolio diversity (APD) on radical innovation performance can be achieved not only directly, but also via moderating roles, that is,
María Ancín   +2 more
wiley   +1 more source

Enkripsi dan Dekripsi File dengan Algoritma Blowfish pada Perangkat Mobile Berbasis Android

open access: yesJurnal Nasional Teknik Elektro, 2016
Cryptography is one of the ways used to secure data in the form of a file with encrypt files so that others are not entitled to know the file is private and confidential.
Siswo Wardoyo   +2 more
doaj   +1 more source

A SAT-based Public Key Cryptography Scheme [PDF]

open access: yesarXiv, 2015
A homomorphic public key crypto-scheme based on the Boolean Satisfiability Problem is proposed. The public key is a SAT formula satisfied by the private key. Probabilistic encryption generates functions implied to be false by the public key XOR the message bits. A zero-knowledge proof is used to provide signatures.
arxiv  

The impact of the Russia–Ukraine war on stock prices, profits and perceptions in the food supply chain

open access: yesAgribusiness, EarlyView.
Abstract The Russian invasion of Ukraine in February 2022 had profound consequences for the global economy. As both countries are major commodity exporters, the food value chain was also affected. This study investigates the impact of the invasion on stock prices, profitability and sentiments of agribusinesses along the food supply chain by using an ...
Julia Höhler   +2 more
wiley   +1 more source

IMPLEMENTASI KOMPILASI ALGORITMA KRIPTOGRAFI TRANSPOSISI COLUMNAR DAN RSA UNTUK PENGAMANAN PESAN RAHASIA

open access: yesJurnal informatika UPGRIS, 2019
Data security is important in maintaining the confidentiality of certain data that can only be known by those who have rights. If the data transmission is done by using network, there is a big possibility the data to be known by unauthorized parties ...
Yuza Reswan   +2 more
doaj   +1 more source

A Context-Based Secure Handover Mechanism for Space-Ground-Integrated Network

open access: yesResearch Briefs on Information & Communication Technology Evolution, 2020
This paper suggests a context-based secure handover mechanism for the frequent handover problem of satellite access nodes due to its high-speed motion in Space-Ground-Integrated Network. This approach applies Private Key Generator (PKG) in identity-based
Hang Zhao
doaj   +1 more source

Home - About - Disclaimer - Privacy