Results 111 to 120 of about 319,858 (317)
Cryptanalysis of Xinyu et al.'s NTRU-Lattice Based Key Exchange Protocol [PDF]
Xinyu et al. proposed a public key exchange protocol, which is based on the NTRU-lattice based cryptography. In this paper, we show how Xinyu et al.'s NTRU-KE: A lattice based key exchange protocol can be broken, under the assumption that a man-in-the middle attack is used for extracting private keys of users who participate in the key exchange ...
arxiv
Abstract This study explores the rent price ratio in agricultural land markets, crucial for evaluating market efficiency, policy needs, and farmer decision‐making. Traditionally, the analyses faced challenges due to the absence of concurrent sale and rent data for the same land, potentially leading to biased results.
Marius Michels+4 more
wiley +1 more source
Information and data protection within a RDBMS
Security issues for some special large data, such as binary and image files, as well as video and audio files and streams still require a special development, especially for the industrial database systems (Oracle, MS SQL, DB2, etc).
Y. Khmelevsky
doaj +1 more source
Price Premiums for Single‐Name and Compound‐Name Geographical Indications in Swiss Cheese Trade
ABSTRACT Geographical indications (GIs) have become increasingly important in agri‐food markets, especially in Europe. For Swiss cheese imports and exports, we analyze whether GIs are associated with higher trade prices. We find that price premiums can be obtained for both exports and imports. However, this is only the case for cheeses with single name
Judith Irek
wiley +1 more source
A Restrained Paillier Cryptosystem and Its Applications for Access Control of Common Secret [PDF]
The modified Paillier cryptosystem has become extremely popular and applied in many fields, owning to its additive homomorphism. This cryptosystem provides weak private keys and a strong private key. A weak private key only can decrypt ciphertexts under the corresponding public key.
arxiv
ABSTRACT Social tensions and resource depletion pose significant challenges to the agri‐food sector, highlighting the need for coordinated strategies to ensure sustainability in supply chains. Despite its critical importance, the relationship between coordination mechanisms and sustainability performance remains underexplored.
Carlos Moreno‐Miranda, Liesbeth Dries
wiley +1 more source
A Privacy‐Preserving System for Confidential Carpooling Services Using Homomorphic Encryption
This research presents a homomorphic encryption‐based solution to enhance privacy in carpooling without compromising functionality. Rigorous experiments confirm its robustness, accuracy, and efficiency in securely matching users while preserving confidentiality.
David Palma+3 more
wiley +1 more source
Text‐to‐Haptics: Enhancing Multisensory Storytelling through Emotionally Congruent Midair Haptics
Imagine feeling the pulse of a story in the palm of your hand. This research combines AI‐driven sentiment analysis with mid‐air haptics and immersive audio‐visuals, transforming narrative engagement through touch. A user study involving 40 participants supports the method's effectiveness, showing how mapped haptic cues deepen sensory and emotional ...
Maciej Stroinski+5 more
wiley +1 more source
Quantum Key Distribution Protocol with Private-Public Key [PDF]
A quantum cryptographic protocol based in public key cryptography combinations and private key cryptography is presented. Unlike the BB84 protocol [1] and its many variants [2,3] two quantum channels are used. The present research does not make reconciliation mechanisms of information to derive the key.
arxiv
A novel in situ XOR encryption/decryption method using a nanoelectromechanical physically unclonable function (NEM‐PUF) is introduced, enhancing security in data transfers between servers/clouds and edge devices. Integrated with the CMOS BEOL process, NEM‐PUFs utilize random stiction for entropy, enabling efficient bitwise XOR operations. This approach
Changha Kim+6 more
wiley +1 more source