Results 111 to 120 of about 153,790 (328)

Security Analysis of Speech Perceptual Hashing Authentication Algorithm

open access: yesInternational Journal of Security and Its Applications, 2016
Speech perceptual hashing authentication algorithm is an efficient method for content integrity authentication and identity authentication. But the algorithm becomes transparent under the principle of Kerckhoffs which makes the algorithm unsafe. In this paper, the algorithm is encrypted under the principle of Kerckhoffs to protect the security of the ...
Zhang Qiu-yu   +4 more
openaire   +1 more source

Flow‐pattern evolution of the Scandinavian Ice Sheet indicated by the subglacial lineation record over Norway, Sweden and Finland

open access: yesBoreas, EarlyView.
We present a 25‐stage reconstruction of the ice‐flow pattern evolution of the Scandinavian Ice Sheet based on mapping and analysis of ~240 000 subglacial lineations and lineation fields across Norway, Sweden, Finland, and parts of NW Russia. Our reconstruction uses a glacial geomorphological inversion approach, in which we generated 611 individual ...
Frances E. G. Butcher   +9 more
wiley   +1 more source

Implicit Promises and the Timing of Defined‐Benefit Pension Plan Freezes

open access: yesFinancial Management, EarlyView.
ABSTRACT Firms time defined‐benefit (DB) plan freezes after CEO turnovers to protect CEO retirement benefits from cost cuts affecting the wider workforce. We document a significant increase in voluntary CEO turnovers just before the freeze, without notable post‐freeze changes.
Zacharias Petrou, Adamos Vlittis
wiley   +1 more source

ARPA Whitepaper [PDF]

open access: yes, 2018
We propose a secure computation solution for blockchain networks. The correctness of computation is verifiable even under malicious majority condition using information-theoretic Message Authentication Code (MAC), and the privacy is preserved using ...
Chen, Jiang   +3 more
core   +1 more source

Secure Sensitive Data Sharing Using RSA and ElGamal Cryptographic Algorithms with Hash Functions [PDF]

open access: gold, 2022
Abidemi Emmanuel Adeniyi   +4 more
openalex   +1 more source

An Economic Analysis of Difficulty Adjustment Algorithms in Proof‐of‐Work Blockchain Systems

open access: yesInternational Economic Review, EarlyView.
ABSTRACT We study the stability of cryptocurrency systems through difficulty adjustment. Bitcoin's difficulty adjustment algorithm (DAA) exhibits instability when the reward elasticity of the hash rate is high, implying that a sharp price reduction could disrupt the current Bitcoin system.
Shunya Noda   +2 more
wiley   +1 more source

Entrepreneurial Market Leadership Claims, Cultural Resonance, and Investor Evaluations in Nascent Markets: The Goldilocks Effect

open access: yesJournal of Management Studies, EarlyView.
Abstract Cultural entrepreneurship research emphasizes entrepreneurs’ use of cultural resources to influence audience evaluations through resonance. However, the process by which such cultural resonance is achieved remains underexplored, particularly as an intermediary outcome.
Xiumei Li   +3 more
wiley   +1 more source

Syrga2: Post-Quantum Hash-Based Signature Scheme

open access: yesComputation
This paper proposes a new post-quantum signature scheme, Syrga2, based on hash functions. As known, existing post-quantum algorithms are classified based on their structures.
Kunbolat Algazy   +3 more
doaj   +1 more source

KALwEN: A New Practical and Interoperable Key Management Scheme for Body Sensor Networks [PDF]

open access: yes, 2008
Key management is the pillar of a security architecture. Body sensor networks(BSNs) pose several challenges -- some inherited from wireless sensor networks(WSNs), some unique to themselves -- that require a new key management scheme to be tailor-made ...
Gong, Z.   +4 more
core   +2 more sources

Diffusion model‐regularized implicit neural representation for computed tomography metal artifact reduction

open access: yesQuantitative Biology, Volume 14, Issue 2, June 2026.
Abstract Computed tomography (CT) images are often severely corrupted by artifacts in the presence of metals. Existing supervised metal artifact reduction (MAR) approaches suffer from performance instability on known data due to their reliance on limited paired metal‐clean data, which limits their clinical applicability. Moreover, existing unsupervised
Jie Wen   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy