Results 91 to 100 of about 105,934 (253)

A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM [PDF]

open access: yes, 2017
Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a number of applications, in particular, as an essential building block for two-party and multi-party computation.
Barreto, Paulo S. L. M.   +4 more
core   +1 more source

A novel generalized spatial mark‐resight model that accounts for group associations

open access: yesMethods in Ecology and Evolution, EarlyView.
Abstract The number and distribution of animals in space form the basis of many wildlife studies. Yet, reliable estimation of population abundance remains challenging. Generalized spatial mark‐resight (gSMR) models are widely applicable abundance estimators that do not require all individuals be uniquely identifiable.
Connor J. Meyer   +3 more
wiley   +1 more source

On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services

open access: yesIEEE Access, 2017
Secure and efficient lightweight user authentication protocol for mobile cloud computing becomes a paramount concern due to the data sharing using Internet among the end users and mobile devices.
Sandip Roy   +5 more
doaj   +1 more source

From politics to economics: The investigation of the determinants of local administrative hierarchy in the Tang–Song transition

open access: yesAsia‐Pacific Economic History Review, Volume 65, Issue 1, Page 39-78, March 2025.
Abstract This study collects original data to examine the determinants of classification criteria of county hierarchy and its rank variations during the Tang–Song period. The results reveal that the county hierarchy was affected by both economic and political situations, with more emphasis on politics in Tang and economics in Song.
Nan Li, Heqi Cai
wiley   +1 more source

Voice of Asia: Provision of Patient‐Centered Care in Oral Cavity Cancer: A Qualitative Study With Patients, Caregivers, and Healthcare Professionals in Five Asia‐Pacific Regions

open access: yesAsia-Pacific Journal of Clinical Oncology, EarlyView.
The study identified key barriers to optimal patient‐centered care, including delayed diagnosis due to awareness and stigma‐related barriers among patients and caregivers, and opportunities to enhance multidisciplinary coordination. Resource limitations impacted nursing and psychosocial support, while access to support care varied across regions.
Edwin Pun Hui   +10 more
wiley   +1 more source

Minimax-optimal Inference from Partial Rankings [PDF]

open access: yes, 2014
This paper studies the problem of inferring a global preference based on the partial rankings provided by many users over different subsets of items according to the Plackett-Luce model.
Hajek, Bruce, Oh, Sewoong, Xu, Jiaming
core  

Miners' Reward Elasticity and Stability of Competing Proof‐of‐Work Cryptocurrencies

open access: yesInternational Economic Review, EarlyView.
ABSTRACT Proof‐of‐Work cryptocurrencies employ miners to sustain the system through algorithmic reward adjustments. We develop a stochastic model of the multicurrency mining and identify conditions for stable transaction speeds. Bitcoin's algorithm requires hash supply elasticity <$<$1 for stability, while ASERT remains stable for any elasticity and ...
Kohei Kawaguchi   +2 more
wiley   +1 more source

Instantiating Random Oracles via UCEs [PDF]

open access: yes, 2013
This paper provides a (standard-model) notion of security for (keyed) hash functions, called UCE, that we show enables instantiation of random oracles (ROs) in a fairly broad and systematic way. Goals and schemes we consider include deterministic PKE; message-locked encryption; hardcore functions; point-function obfuscation; OAEP; encryption secure for
Mihir Bellare   +2 more
openaire   +1 more source

Investing in Game‐Based Informal Digital Learning of English (IDLE): A Chinese‐Speaking Gaming Community

open access: yesInternational Journal of Applied Linguistics, EarlyView.
ABSTRACT As a rapidly evolving sub‐field of computer‐assisted language learning, informal digital learning of English (IDLE) has become a significant catalyst for linguistic, affective, and pedagogical development among English as a second language (L2) learners.
Yue Zhang
wiley   +1 more source

Permutation-Based Hash Chains with Application to Password Hashing

open access: yesIACR Transactions on Symmetric Cryptology
Hash chain based password systems are a useful way to guarantee authentication with one-time passwords. The core idea dates back to Lamport, and is specified in RFC 1760 as S/Key. At CCS 2017, Kogan et al.
Charlotte Lefevre, Bart Mennink
doaj   +1 more source

Home - About - Disclaimer - Privacy