Results 111 to 120 of about 319,858 (317)

Cryptanalysis of Xinyu et al.'s NTRU-Lattice Based Key Exchange Protocol [PDF]

open access: yesarXiv, 2016
Xinyu et al. proposed a public key exchange protocol, which is based on the NTRU-lattice based cryptography. In this paper, we show how Xinyu et al.'s NTRU-KE: A lattice based key exchange protocol can be broken, under the assumption that a man-in-the middle attack is used for extracting private keys of users who participate in the key exchange ...
arxiv  

Analyzing individual rent price ratios in eastern German agricultural land markets: A GAMLSS approach

open access: yesAgribusiness, EarlyView.
Abstract This study explores the rent price ratio in agricultural land markets, crucial for evaluating market efficiency, policy needs, and farmer decision‐making. Traditionally, the analyses faced challenges due to the absence of concurrent sale and rent data for the same land, potentially leading to biased results.
Marius Michels   +4 more
wiley   +1 more source

Information and data protection within a RDBMS

open access: yesCondensed Matter Physics, 2008
Security issues for some special large data, such as binary and image files, as well as video and audio files and streams still require a special development, especially for the industrial database systems (Oracle, MS SQL, DB2, etc).
Y. Khmelevsky
doaj   +1 more source

Price Premiums for Single‐Name and Compound‐Name Geographical Indications in Swiss Cheese Trade

open access: yesAgribusiness, EarlyView.
ABSTRACT Geographical indications (GIs) have become increasingly important in agri‐food markets, especially in Europe. For Swiss cheese imports and exports, we analyze whether GIs are associated with higher trade prices. We find that price premiums can be obtained for both exports and imports. However, this is only the case for cheeses with single name
Judith Irek
wiley   +1 more source

A Restrained Paillier Cryptosystem and Its Applications for Access Control of Common Secret [PDF]

open access: yesarXiv, 2019
The modified Paillier cryptosystem has become extremely popular and applied in many fields, owning to its additive homomorphism. This cryptosystem provides weak private keys and a strong private key. A weak private key only can decrypt ciphertexts under the corresponding public key.
arxiv  

The Role of Coordination Mechanisms and Transaction Costs Promoting Sustainability Performance in Agri‐Food Supply Chains: Evidence From Ecuador

open access: yesAgribusiness, EarlyView.
ABSTRACT Social tensions and resource depletion pose significant challenges to the agri‐food sector, highlighting the need for coordinated strategies to ensure sustainability in supply chains. Despite its critical importance, the relationship between coordination mechanisms and sustainability performance remains underexplored.
Carlos Moreno‐Miranda, Liesbeth Dries
wiley   +1 more source

A Privacy‐Preserving System for Confidential Carpooling Services Using Homomorphic Encryption

open access: yesAdvanced Intelligent Systems, EarlyView.
This research presents a homomorphic encryption‐based solution to enhance privacy in carpooling without compromising functionality. Rigorous experiments confirm its robustness, accuracy, and efficiency in securely matching users while preserving confidentiality.
David Palma   +3 more
wiley   +1 more source

Text‐to‐Haptics: Enhancing Multisensory Storytelling through Emotionally Congruent Midair Haptics

open access: yesAdvanced Intelligent Systems, EarlyView.
Imagine feeling the pulse of a story in the palm of your hand. This research combines AI‐driven sentiment analysis with mid‐air haptics and immersive audio‐visuals, transforming narrative engagement through touch. A user study involving 40 participants supports the method's effectiveness, showing how mapped haptic cues deepen sensory and emotional ...
Maciej Stroinski   +5 more
wiley   +1 more source

Quantum Key Distribution Protocol with Private-Public Key [PDF]

open access: yesarXiv, 2009
A quantum cryptographic protocol based in public key cryptography combinations and private key cryptography is presented. Unlike the BB84 protocol [1] and its many variants [2,3] two quantum channels are used. The present research does not make reconciliation mechanisms of information to derive the key.
arxiv  

In Situ XOR Encryption for Lightweight Security Using Nanoelectromechanical Physically Unclonable Functions

open access: yesAdvanced Intelligent Systems, EarlyView.
A novel in situ XOR encryption/decryption method using a nanoelectromechanical physically unclonable function (NEM‐PUF) is introduced, enhancing security in data transfers between servers/clouds and edge devices. Integrated with the CMOS BEOL process, NEM‐PUFs utilize random stiction for entropy, enabling efficient bitwise XOR operations. This approach
Changha Kim   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy