Results 81 to 90 of about 6,908 (279)
Permutation-Based Hash Chains with Application to Password Hashing
Hash chain based password systems are a useful way to guarantee authentication with one-time passwords. The core idea dates back to Lamport, and is specified in RFC 1760 as S/Key. At CCS 2017, Kogan et al.
Charlotte Lefevre, Bart Mennink
doaj +1 more source
Quantum Circuit Design using a Progressive Widening Enhanced Monte Carlo Tree Search
This article proposes the Progressive Widening enhanced Monte Carlo Tree Search (PWMCTS) to design parameterized quantum circuits. It improves the efficiency of the previous MCTS‐based techniques in terms of number of quantum circuit evaluation, number of gates and CNOT count.
Vincenzo Lipardi+3 more
wiley +1 more source
In the widely demonized municipality of Ettadhamun, the heavy hand of Zin al Abidine Ben Ali's police state was partly lifted in 2011 and replaced by the softer touch of aid promoting international democracy. This aid architecture supported the burgeoning civil society to train Ettadhamun residents in the skill of ‘interpersonal communication’ (tawasul
Charis Boutieri
wiley +1 more source
Formal Indistinguishability Extended to the Random Oracle Model [PDF]
Several generic constructions for transforming one-way func-tions to asymmetric encryption schemes have been proposed. One-way functions only guarantee the weak secrecy of their arguments. That is, given the image by a one-way function of a random value, an adversary has only negligible probability to compute this random value. Encryp-tion schemes must
Ene, Cristian+2 more
openaire +4 more sources
Abstract This study collects original data to examine the determinants of classification criteria of county hierarchy and its rank variations during the Tang–Song period. The results reveal that the county hierarchy was affected by both economic and political situations, with more emphasis on politics in Tang and economics in Song.
Nan Li, Heqi Cai
wiley +1 more source
With probability one, a random oracle separates PSPACE from the polynomial-time hierarchy [PDF]
Jin‐Yi Cai
openalex +1 more source
On the diversity of test instances for studying branch‐and‐bound performance
Summary In their paper ‘An Automatic Method for Solving Discrete Programming Problems’, Ailsa Land and Alison Doig developed a branch‐and‐bound method for solving the general case of the mixed integer linear programming (MIP) problem. A core part of the algorithm, branch variable selection, has received renewed attention in recent years with the ...
Simon Bowly, Kate Smith‐Miles
wiley +1 more source
Provable data possession scheme with authentication
To satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios,a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing,the proposed scheme
Hao-xing LI+3 more
doaj
Current application of blockchain technology in healthcare and its potential roles in Urology
Objective To assess the current uses of blockchain technology in surgery and explore potential applications in urology. Methods A systematic literature review and critical appraisal was performed. The PubMed database was searched for all relevant papers published in English, between 2003 and 2023, on blockchain and surgery, and urology.
Sulleyman Felemban+6 more
wiley +1 more source