Results 101 to 110 of about 319,858 (317)
Mutual authenticated quantum no-key encryption scheme over private quantum channel [PDF]
We realize shamir's no-key protocol via quantum computation of Boolean permutation and private quantum channel. The quantum no-key (QNK) protocol presented here is one with mutual authentications, and proved to be unconditionally secure. An important property of this protocol is that0 its authentication key can be reused permanently.
arxiv
Symmetric Key Cryptography: Technological Developments in the Field
This paper presents the various developments and emerging trends in the symmetric key cryptography technique. It provides an overview of latest inventions and approaches that are implemented in the recent scenario for the betterment of private key ...
Md. Sarfaraz Iqbal+2 more
semanticscholar +1 more source
Supply chain risk in grain trading: Inventories as real options for shipping grain
Abstract Integrating trading and logistics is an important challenge in commodity trading. Trading and logistics are strategic decisions and are integral to most commodities including grain shipping by rail, in addition to other modes (barges, ocean shipping). There are substantial risks, such as the ordering and placement of rail cars.
William W. Wilson, Jesse Klebe
wiley +1 more source
BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets [PDF]
Cryptocurrency wallets store the wallets private key(s), and hence, are a lucrative target for attackers. With possession of the private key, an attacker virtually owns all of the currency in the compromised wallet. Managing cryptocurrency wallets offline, in isolated ('air-gapped') computers, has been suggested in order to secure the private keys from
arxiv
Abstract This study examines how European food companies can operationally leverage the value created by strategic alliances into commercially viable products. More importantly, it emphasizes that the effects of alliance portfolio diversity (APD) on radical innovation performance can be achieved not only directly, but also via moderating roles, that is,
María Ancín+2 more
wiley +1 more source
Enkripsi dan Dekripsi File dengan Algoritma Blowfish pada Perangkat Mobile Berbasis Android
Cryptography is one of the ways used to secure data in the form of a file with encrypt files so that others are not entitled to know the file is private and confidential.
Siswo Wardoyo+2 more
doaj +1 more source
A SAT-based Public Key Cryptography Scheme [PDF]
A homomorphic public key crypto-scheme based on the Boolean Satisfiability Problem is proposed. The public key is a SAT formula satisfied by the private key. Probabilistic encryption generates functions implied to be false by the public key XOR the message bits. A zero-knowledge proof is used to provide signatures.
arxiv
Abstract The Russian invasion of Ukraine in February 2022 had profound consequences for the global economy. As both countries are major commodity exporters, the food value chain was also affected. This study investigates the impact of the invasion on stock prices, profitability and sentiments of agribusinesses along the food supply chain by using an ...
Julia Höhler+2 more
wiley +1 more source
Data security is important in maintaining the confidentiality of certain data that can only be known by those who have rights. If the data transmission is done by using network, there is a big possibility the data to be known by unauthorized parties ...
Yuza Reswan+2 more
doaj +1 more source
A Context-Based Secure Handover Mechanism for Space-Ground-Integrated Network
This paper suggests a context-based secure handover mechanism for the frequent handover problem of satellite access nodes due to its high-speed motion in Space-Ground-Integrated Network. This approach applies Private Key Generator (PKG) in identity-based
Hang Zhao
doaj +1 more source