Results 81 to 90 of about 63,410 (288)

Key derivation function: key-hash based computational extractor and stream based pseudorandom expander [PDF]

open access: yesPeerJ Computer Science
The key derivation function is a specific cryptographic algorithm that transforms private string and public strings into one or more cryptographic keys.
Chai Wen Chuah   +2 more
doaj   +2 more sources

The Myth of Superiority of American Encryption Products [PDF]

open access: yes, 1998
Encryption software and hardware use sophisticated mathematical algorithms to encipher a message so that only the intended recipient may read it. Fearing that criminals and terrorists will use encryption to evade authorities, the United States now ...
Henry B. Wolfe
core  

A Scoping Review of Nudges for Enhancing Agricultural Policy

open access: yesApplied Economic Perspectives and Policy, EarlyView.
ABSTRACT Following PRISMA guidelines, we conduct a scoping review on 18 empirical studies on nudging interventions for farmers in Europe and the USA. The evidence on the effectiveness of nudges is mixed. Some studies demonstrate positive outcomes, particularly when nudges are combined with other interventions; others report no effect or negative ...
Nadja El Benni   +4 more
wiley   +1 more source

Comprehensive Analysis of Cryptographic Algorithms: Implementation and Security Insights

open access: yesEngineering Proceedings
This study surveys some cryptographic algorithms in a detailed manner; it mainly focuses on symmetric key cryptography and asymmetric key cryptography with hash functions following them.
Rashid Muhenga   +4 more
doaj   +1 more source

Do Consumers Value Diversity in Agriculture? A Choice Experiment

open access: yesApplied Economic Perspectives and Policy, EarlyView.
ABSTRACT Farm ownership in the US today is racially and ethnically homogeneous. Diverse farmers and ranchers make up less than 10% of all producers, they tend to be less financially stable and have tighter profit margins. In the past few years, both government and industry programs have aimed to increase the participation and profitability of diverse ...
Maria Kalaitzandonakes   +2 more
wiley   +1 more source

Changes in Alcohol Retail Laws and Foot Traffic at Liquor Stores

open access: yesApplied Economic Perspectives and Policy, EarlyView.
ABSTRACT We study how expanding alcohol availability at grocery and convenience stores affects consumer traffic in liquor stores by leveraging recent changes in state‐level alcohol distribution laws in a difference‐in‐difference quasi‐experimental design.
Nathan Palardy   +3 more
wiley   +1 more source

Feasibility of Quantum Key Distribution Between Supersonic Aircraft

open access: yesIET Quantum Communication
Quantum key distribution (QKD) leverages the laws of quantum mechanics to enable the secure transfer of information and is the only known method of key exchange capable of providing verifiable security.
Solomon Raphael McKiernan   +1 more
doaj   +1 more source

The Future of Hydrogen‐Powered Aviation: Technologies, Challenges, and a Strategic Roadmap for Sustainable Decarbonization

open access: yesAdvanced Energy and Sustainability Research, EarlyView.
Hydrogen‐powered aviation offers a transformative pathway to zero‐emission flight by eliminating in‐flight CO2 emissions. Key considerations include propulsion systems (fuel cells and hydrogen combustion), cryogenic storage and insulation challenges, infrastructure and cost barriers, and supply‐chain constraints.
Mubasshira   +4 more
wiley   +1 more source

The impact of the Russia–Ukraine war on stock prices, profits and perceptions in the food supply chain

open access: yesAgribusiness, EarlyView.
Abstract The Russian invasion of Ukraine in February 2022 had profound consequences for the global economy. As both countries are major commodity exporters, the food value chain was also affected. This study investigates the impact of the invasion on stock prices, profitability and sentiments of agribusinesses along the food supply chain by using an ...
Julia Höhler   +2 more
wiley   +1 more source

CASDC: A Cryptographically Secure Data System Based on Two Private Key Images [PDF]

open access: gold, 2022
Mua’ad Abu-Faraj   +4 more
openalex   +1 more source

Home - About - Disclaimer - Privacy