Results 121 to 130 of about 147,726 (298)
A secure and lightweight ad-hoc routing algorithm for personal networks [PDF]
Over the past few years, there has been increasing interest in utilizing Personal Area Networks (PANs) to offer users innovative and personalized services.
Heemstra de Groot, S.M., Jehangir, A.
core +1 more source
TDHA: A Timestamp Defined Hash Algorithm for Secure Data Dissemination in VANET
AbstractThe safety application in vehicular ad hoc network provides active road safety to avoid road accidents by disseminating life critical information among drivers securely. Such information must be protected from the access of intruder or attacker.
Sulata Mitra, Atanu Mondal
openaire +2 more sources
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo +3 more
wiley +1 more source
Syrga2: Post-Quantum Hash-Based Signature Scheme
This paper proposes a new post-quantum signature scheme, Syrga2, based on hash functions. As known, existing post-quantum algorithms are classified based on their structures.
Kunbolat Algazy +3 more
doaj +1 more source
BlockChain: A distributed solution to automotive security and privacy
Interconnected smart vehicles offer a range of sophisticated services that benefit the vehicle owners, transport authorities, car manufacturers and other service providers.
Dorri, Ali +3 more
core +1 more source
Current application of blockchain technology in healthcare and its potential roles in Urology
Objective To assess the current uses of blockchain technology in surgery and explore potential applications in urology. Methods A systematic literature review and critical appraisal was performed. The PubMed database was searched for all relevant papers published in English, between 2003 and 2023, on blockchain and surgery, and urology.
Sulleyman Felemban +6 more
wiley +1 more source
Hardware-based Security for Virtual Trusted Platform Modules
Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to the hardware-based TPMs to allow the use of their cryptographic functionalities in scenarios where multiple TPMs are required in a single platform, such as in ...
Alsouri, Sami +3 more
core
The study of the speed and statistical security of cryptographic hashing algorithms
Comparative studies of cryptographic hashing algorithms are being carried out, which are used (or can be applied) in modern decentralized blockchain systems. In particular, hashing speed of action is studied on different desktop systems, the number of clock cycles of the computing system per byte (Cycles / byte), the volume of the hashed message per ...
openaire +2 more sources
The Myths of Blockchain Governance
ABSTRACT Research Question/Issue Blockchain technology promises to revolutionize governance through strong commitments, trustlessness, and transparency. This paper examines how these promises have failed to materialize in practice. Research Findings/Insights Drawing on case evidence from major blockchains, including Bitcoin and Ethereum, I argue that ...
Daniel Ferreira
wiley +1 more source
Implicit Promises and the Timing of Defined‐Benefit Pension Plan Freezes
ABSTRACT Firms time defined‐benefit (DB) plan freezes after CEO turnovers to protect CEO retirement benefits from cost cuts affecting the wider workforce. We document a significant increase in voluntary CEO turnovers just before the freeze, without notable post‐freeze changes.
Zacharias Petrou, Adamos Vlittis
wiley +1 more source

