Results 61 to 70 of about 302 (149)
This paper addresses the limitations of existing conditional privacy‐preserving authentication (CPPA) schemes in vehicular ad hoc networks (VANETs), which are either computationally heavy or vulnerable to quantum attacks. It proposes a multi‐aggregator lattice‐based CPPA (MA‐LCPPA) framework that distributes verification across multiple roadside units ...
Adi El‐Dalahmeh, Jie Li
wiley +1 more source
Design of Linkable Ring Signature Scheme Based on the MP-LWE Problem and Its Application in IoV
Ensuring the information security and privacy of users in the Internet of Vehicles (IoV) is crucial for gaining user trust and promoting the application of vehicular networks.
Lansheng Han, Wei Liao, Peng Chen
doaj +1 more source
Morphology and function of pinniped necks: The long and short of it
Abstract Terrestrial vertebrates from at least 30 distinct lineages in both extinct and extant clades have returned to aquatic environments. With these transitions came numerous morphological adaptations to accommodate life in water. Relatively little attention has been paid to the cervical region when tracking this transition.
Justin Keller +3 more
wiley +1 more source
Abstract In 2023, atmospheric methane (CH4) saw a decrease in the annual growth rate following record increases from 2020 to 2022. Recent changes in CH4 remain difficult to quantify due to delays in near‐real‐time (NRT) carbon cycle estimates. However, NRT models and subseasonal‐to‐seasonal (S2S) forecasting can provide the opportunity to analyze ...
Colin A. Quinn +7 more
wiley +1 more source
Secondary forests are crucial for achieving COP15/16 conservation goals. An operational national approach was developed to identify and characterise forest ecosystems based on the dominant tree species in the canopy, serving as indicators for ecosystem extent and condition.
Maïri Souza Oliveira +13 more
wiley +1 more source
Abstract Large‐scale and intense heatwaves pose significant risks to ecosystems and human society due to associated heat and water stress. Heatwaves can be classified as daytime, nighttime, and compound, depending on their occurrence time. However, the factors shaping global spatiotemporal patterns of heatwaves remain poorly understood, especially ...
Kun Zhang +8 more
wiley +1 more source
Generic Quantum‐Safe IIoT Forensics Framework (QS‐IIoT‐F) ABSTRACT The continuous evolution of quantum computing has shown novel and transformative possibilities and critical implications for the Industrial Internet of Things (IIoT) forensic processes.
Victor R. Kebande
wiley +1 more source
Post-Quantum Universal Composable OT Based on Key Exchange
We construct a universal composable framework for two-message oblivious transfer protocols based on lattice-assumption. Compared with the paper proposed by Liu and Hu, we modify a framework proposed by Liu and Hu by adding three tools, which are XOR, Bit
Ding Hangchao, Han Jiang, Qiuliang Xu
doaj +1 more source
Abstract Accurate observations of maritime low clouds are important for air and sea transportation, understanding boundary layer processes, and measuring Earth's radiation budget. The nighttime maritime low cloud extent is often determined in meteorological satellite imagery using the brightness‐temperature difference between the longwave infrared (e.g.
Jesse D. Turner +6 more
wiley +1 more source
Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts [PDF]
We provide a tight security proof for an IND-CCA Ring-LWE based Key Encapsulation Mechanism that is derived from a generic construction of Dent (IMA Cryptography and Coding, 2003). Such a tight reduction is not known for the generic construction. The resulting scheme has shorter ciphertexts than can be achieved with other generic constructions of Dent ...
Albrecht M. R. +4 more
openaire +2 more sources

