Results 241 to 250 of about 112,587 (333)
Post-Quantum Revocable Linkable Ring Signature Scheme Based on SPHINCS+ for V2G Scenarios. [PDF]
Liu S, Du YN, Wang XA, Hu X, Su HE.
europepmc +1 more source
(Dis)information Systems: a Systemic View of Disinformation
ABSTRACT Disinformation is an ancient social phenomenon that has found a favourable environment for dissemination in internet‐based social networks. While the scientific community seeks to address the problem by creating specific tools to detect and classify the various types of false information, we argue that systems thinking is necessary to ...
Herbert Laroca +2 more
wiley +1 more source
Two secure authentication protocols for mitigating vulnerabilities in IoD. [PDF]
Safkhani M, Ghorbani Fard M.
europepmc +1 more source
Code based Secret Sharing Schemes for MANET
Padmavathi Guddeti +2 more
openalex +1 more source
In the aftermath of the 2020 U.S. election, the boundary between activism and extremism blurred, with election officials reporting violent threats and false accusations of election fraud. From a symbolic interactionist perspective, these attacks provide a unique lens for examining the consequences of being falsely labeled a criminal.
Steven Windisch
wiley +1 more source
Data security storage and transmission framework for AI computing power platforms. [PDF]
Chen J +5 more
europepmc +1 more source
Embedded Interactions and Selective Disclosure: Network Effects on Conversations aboard Skylab
How do absent others influence our interactions? We argue in this paper that interactions are embedded within networks formed by chains of specific relationships between known third parties. The anticipation of future interactions with external others conditions our interpretation of the current situation and affects our behavior in the interaction. We
Michael Schultz +2 more
wiley +1 more source
Authenticable quantum secret sharing based on special entangled state. [PDF]
Bai CM, Shu YX, Zhang S.
europepmc +1 more source

