Results 91 to 100 of about 105,934 (253)
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM [PDF]
Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a number of applications, in particular, as an essential building block for two-party and multi-party computation.
Barreto, Paulo S. L. M. +4 more
core +1 more source
A novel generalized spatial mark‐resight model that accounts for group associations
Abstract The number and distribution of animals in space form the basis of many wildlife studies. Yet, reliable estimation of population abundance remains challenging. Generalized spatial mark‐resight (gSMR) models are widely applicable abundance estimators that do not require all individuals be uniquely identifiable.
Connor J. Meyer +3 more
wiley +1 more source
Secure and efficient lightweight user authentication protocol for mobile cloud computing becomes a paramount concern due to the data sharing using Internet among the end users and mobile devices.
Sandip Roy +5 more
doaj +1 more source
Abstract This study collects original data to examine the determinants of classification criteria of county hierarchy and its rank variations during the Tang–Song period. The results reveal that the county hierarchy was affected by both economic and political situations, with more emphasis on politics in Tang and economics in Song.
Nan Li, Heqi Cai
wiley +1 more source
The study identified key barriers to optimal patient‐centered care, including delayed diagnosis due to awareness and stigma‐related barriers among patients and caregivers, and opportunities to enhance multidisciplinary coordination. Resource limitations impacted nursing and psychosocial support, while access to support care varied across regions.
Edwin Pun Hui +10 more
wiley +1 more source
Minimax-optimal Inference from Partial Rankings [PDF]
This paper studies the problem of inferring a global preference based on the partial rankings provided by many users over different subsets of items according to the Plackett-Luce model.
Hajek, Bruce, Oh, Sewoong, Xu, Jiaming
core
Miners' Reward Elasticity and Stability of Competing Proof‐of‐Work Cryptocurrencies
ABSTRACT Proof‐of‐Work cryptocurrencies employ miners to sustain the system through algorithmic reward adjustments. We develop a stochastic model of the multicurrency mining and identify conditions for stable transaction speeds. Bitcoin's algorithm requires hash supply elasticity <$<$1 for stability, while ASERT remains stable for any elasticity and ...
Kohei Kawaguchi +2 more
wiley +1 more source
Instantiating Random Oracles via UCEs [PDF]
This paper provides a (standard-model) notion of security for (keyed) hash functions, called UCE, that we show enables instantiation of random oracles (ROs) in a fairly broad and systematic way. Goals and schemes we consider include deterministic PKE; message-locked encryption; hardcore functions; point-function obfuscation; OAEP; encryption secure for
Mihir Bellare +2 more
openaire +1 more source
ABSTRACT As a rapidly evolving sub‐field of computer‐assisted language learning, informal digital learning of English (IDLE) has become a significant catalyst for linguistic, affective, and pedagogical development among English as a second language (L2) learners.
Yue Zhang
wiley +1 more source
Permutation-Based Hash Chains with Application to Password Hashing
Hash chain based password systems are a useful way to guarantee authentication with one-time passwords. The core idea dates back to Lamport, and is specified in RFC 1760 as S/Key. At CCS 2017, Kogan et al.
Charlotte Lefevre, Bart Mennink
doaj +1 more source

