Results 131 to 140 of about 147,726 (298)

Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem

open access: yesSensors, 2010
Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue.
Eun-Suk Cho   +3 more
doaj   +1 more source

A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components [PDF]

open access: yes, 2017
The semiconductor industry is fully globalized and integrated circuits (ICs) are commonly defined, designed and fabricated in different premises across the world. This reduces production costs, but also exposes ICs to supply chain attacks, where insiders
Cerulli, Andrea   +5 more
core   +1 more source

An Economic Analysis of Difficulty Adjustment Algorithms in Proof‐of‐Work Blockchain Systems

open access: yesInternational Economic Review, EarlyView.
ABSTRACT We study the stability of cryptocurrency systems through difficulty adjustment. Bitcoin's difficulty adjustment algorithm (DAA) exhibits instability when the reward elasticity of the hash rate is high, implying that a sharp price reduction could disrupt the current Bitcoin system.
Shunya Noda   +2 more
wiley   +1 more source

Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2

open access: yesWasit Journal of Engineering Sciences
Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world.
Nada Abdul Aziz Mustafa
doaj   +1 more source

Medical Image Reliability Verification Using Hash Signatures and Sequential Square Encoding

open access: yesJournal of Intelligent Systems, 2018
Increased growth of information technology in healthcare has led to a situation where the security of patient information is more important and is a critical issue.
Ranjani J. Jennifer, Babu M.
doaj   +1 more source

Sensemaking of Process Data from Evaluation Studies of Educational Games: An Application of Cross‐Classified Item Response Theory Modeling

open access: yesJournal of Educational Measurement, EarlyView.
Abstract Process information collected from educational games can illuminate how students approach interactive tasks, complementing assessment outcomes routinely examined in evaluation studies. However, the two sources of information are historically analyzed and interpreted separately, and diagnostic process information is often underused.
Tianying Feng, Li Cai
wiley   +1 more source

LDPC and SHA based iris recognition for image authentication

open access: yesEgyptian Informatics Journal, 2012
We introduce a novel way to authenticate an image using Low Density Parity Check (LDPC) and Secure Hash Algorithm (SHA) based iris recognition method with reversible watermarking scheme, which is based on Integer Wavelet Transform (IWT) and threshold ...
K. Seetharaman, R. Ragupathy
doaj   +1 more source

Securing End‐To‐End Encrypted File Sharing Services With the Messaging Layer Security Protocol

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 27-28, 25 December 2025.
ABSTRACT Secure file sharing is essential in today's digital environment, yet many systems remain vulnerable: if an attacker steals client keys, they can often decrypt both past and future content. To address this challenge, we propose a novel file‐sharing architecture that strengthens post‐compromise security while remaining practical.
Roland Helmich, Lars Braubach
wiley   +1 more source

Leveraging Sparse Autoencoders to Reveal Interpretable Features in Geophysical Models

open access: yesJournal of Geophysical Research: Machine Learning and Computation, Volume 2, Issue 4, December 2025.
Abstract Machine learning is an increasingly popular tool in the geosciences, offering new approaches to numerical weather prediction and complex data set analysis. However, as reliance on these techniques grows, pressing questions about model transparency, internal biases, and trust emerge.
Fraser King   +4 more
wiley   +1 more source

A Systematic Overview of Caching Mechanisms to Improve Hadoop Performance

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 25-26, 30 November 2025.
ABSTRACT In today's distributed computing environments, the rapid generation of large‐scale data from diverse sources poses significant challenges in terms of storage, management, and processing, particularly for traditional relational databases. Hadoop has emerged as a widely adopted framework for handling such data through parallel processing across ...
Rana Ghazali, Douglas G. Down
wiley   +1 more source

Home - About - Disclaimer - Privacy