Results 111 to 120 of about 153,790 (328)
Security Analysis of Speech Perceptual Hashing Authentication Algorithm
Speech perceptual hashing authentication algorithm is an efficient method for content integrity authentication and identity authentication. But the algorithm becomes transparent under the principle of Kerckhoffs which makes the algorithm unsafe. In this paper, the algorithm is encrypted under the principle of Kerckhoffs to protect the security of the ...
Zhang Qiu-yu +4 more
openaire +1 more source
We present a 25‐stage reconstruction of the ice‐flow pattern evolution of the Scandinavian Ice Sheet based on mapping and analysis of ~240 000 subglacial lineations and lineation fields across Norway, Sweden, Finland, and parts of NW Russia. Our reconstruction uses a glacial geomorphological inversion approach, in which we generated 611 individual ...
Frances E. G. Butcher +9 more
wiley +1 more source
Implicit Promises and the Timing of Defined‐Benefit Pension Plan Freezes
ABSTRACT Firms time defined‐benefit (DB) plan freezes after CEO turnovers to protect CEO retirement benefits from cost cuts affecting the wider workforce. We document a significant increase in voluntary CEO turnovers just before the freeze, without notable post‐freeze changes.
Zacharias Petrou, Adamos Vlittis
wiley +1 more source
We propose a secure computation solution for blockchain networks. The correctness of computation is verifiable even under malicious majority condition using information-theoretic Message Authentication Code (MAC), and the privacy is preserved using ...
Chen, Jiang +3 more
core +1 more source
Secure Sensitive Data Sharing Using RSA and ElGamal Cryptographic Algorithms with Hash Functions [PDF]
Abidemi Emmanuel Adeniyi +4 more
openalex +1 more source
An Economic Analysis of Difficulty Adjustment Algorithms in Proof‐of‐Work Blockchain Systems
ABSTRACT We study the stability of cryptocurrency systems through difficulty adjustment. Bitcoin's difficulty adjustment algorithm (DAA) exhibits instability when the reward elasticity of the hash rate is high, implying that a sharp price reduction could disrupt the current Bitcoin system.
Shunya Noda +2 more
wiley +1 more source
Abstract Cultural entrepreneurship research emphasizes entrepreneurs’ use of cultural resources to influence audience evaluations through resonance. However, the process by which such cultural resonance is achieved remains underexplored, particularly as an intermediary outcome.
Xiumei Li +3 more
wiley +1 more source
Syrga2: Post-Quantum Hash-Based Signature Scheme
This paper proposes a new post-quantum signature scheme, Syrga2, based on hash functions. As known, existing post-quantum algorithms are classified based on their structures.
Kunbolat Algazy +3 more
doaj +1 more source
KALwEN: A New Practical and Interoperable Key Management Scheme for Body Sensor Networks [PDF]
Key management is the pillar of a security architecture. Body sensor networks(BSNs) pose several challenges -- some inherited from wireless sensor networks(WSNs), some unique to themselves -- that require a new key management scheme to be tailor-made ...
Gong, Z. +4 more
core +2 more sources
Abstract Computed tomography (CT) images are often severely corrupted by artifacts in the presence of metals. Existing supervised metal artifact reduction (MAR) approaches suffer from performance instability on known data due to their reliance on limited paired metal‐clean data, which limits their clinical applicability. Moreover, existing unsupervised
Jie Wen +3 more
wiley +1 more source

