Results 111 to 120 of about 61,999 (289)

Traceability of Agri‐Food Products: The Key to Conscious Trade

open access: yesAgribusiness, EarlyView.
ABSTRACT Globalization and growing concerns about sustainability have led to improvements in product traceability, quality, and sustainability. Traceability contributes to environmental protection and supports sustainable development by fostering transparency in agricultural practices and encouraging the responsible use of resources.
Scarlett Queen Almeida Bispo   +5 more
wiley   +1 more source

Re-visiting the One-Time Pad

open access: yes, 2005
In 1949, Shannon proved the perfect secrecy of the Vernam cryptographic system,also popularly known as the One-Time Pad (OTP). Since then, it has been believed that the perfectly random and uncompressible OTP which is transmitted needs to have a length ...
Nagaraj, Nithin   +2 more
core   +2 more sources

Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Classic McEliece is one of the three code-based candidates in the fourth round of the NIST post-quantum cryptography standardization process in the Key Encapsulation Mechanism category. As such, its decapsulation algorithm is used to recover the session
Vlad-Florin Drăgoi   +4 more
doaj   +1 more source

THE McELIECE CRYPTOSYSTEM WITH ARRAY CODES

open access: yesSakarya Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 2011
Public-key cryptosystems form an important part of cryptography. In these systems, every user has a public and a private key. The public key allows other users to encrypt messages, which can only be decoded using the secret private key.
Vedat Şiap
doaj   +1 more source

The Role of Actual and Purported Origin in e‐Commerce Wine Pricing: Evidence From Italian and French Names on Labels

open access: yesAgribusiness, EarlyView.
ABSTRACT The origin of a product, if associated with good quality, can contribute to building a positive collective reputation, leading to a potential price premium. However, it is conceivable that a producer markets a product by evoking symbols, images, words, and values typical of places other than where it was designed or produced, creating a ...
Annalisa Caloffi   +2 more
wiley   +1 more source

Climate‐Smart Dairy Practices: The Role of Practice Clusters in Enhancing the Performance of Dairy Farms in Kenya

open access: yesAgribusiness, EarlyView.
ABSTRACT Climate variability is affecting the productivity, profitability, and resilience of smallholder dairy producers in developing countries. The adoption of climate‐smart (CS) dairy practices has been promoted to mitigate these negative effects. However, while interest in dairy CS practices is growing, empirical evidence on their adoption patterns
Mercy Mburu   +4 more
wiley   +1 more source

The Power of Unity: Collective Action and Smallholder Agricultural Performance in West Africa

open access: yesAgribusiness, EarlyView.
ABSTRACT We analyze the impact of collective action through farmer‐based organizations (FBOs) on smallholders' farm performance and income inequality in Ghana, Benin, The Gambia, and Mali. We find that FBO membership increases cereal yield in Ghana and The Gambia, legume yield in Mali, ruminant numbers in Benin and The Gambia, and total farm income in ...
Emmanuel Donkor   +3 more
wiley   +1 more source

A practical and formal analysis of distributed private key generation for identity based cryptography

open access: yes, 2021
Temelleri gizlilik paylaşımı yöntemlerine dayanan dağıtık gizli anahtar üretimi(DGAÜ) kriptografide gizli anahtarların dağıtık olarak güvenli bir şekilde üretilmesiamacıyla kullanılmaktadır. DGAÜ kullanımına en uygun olan kriptografik sistemlerdenbir tanesi kimlik tabanlı kriptografik sistemdir.
openaire   +1 more source

Laparoscopic Colorectal Surgery in the Era of Robotics: Evolution, Eclipse, or Equilibrium?

open access: yesAnnals of Gastroenterological Surgery, EarlyView.
ABSTRACT Minimally invasive colorectal surgery has undergone a remarkable transformation over the past three decades. Laparoscopy, once viewed with skepticism, is now firmly established as a standard approach, supported by robust randomized trials demonstrating oncologic safety and improved recovery compared to open surgery.
Amanjeet Singh   +3 more
wiley   +1 more source

Public Key Cryptography for 5G Private Identification

open access: yes, 2020
The next generation of mobile networks is called 5G. 5G introduces several improvements from the previous generation known as Long Term Evolution (LTE). Some of these improvements are related to subscriber privacy. A new protection scheme for the permanent subscriber identifier has been included.
openaire   +1 more source

Home - About - Disclaimer - Privacy