Results 131 to 140 of about 147,726 (298)
Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue.
Eun-Suk Cho +3 more
doaj +1 more source
A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components [PDF]
The semiconductor industry is fully globalized and integrated circuits (ICs) are commonly defined, designed and fabricated in different premises across the world. This reduces production costs, but also exposes ICs to supply chain attacks, where insiders
Cerulli, Andrea +5 more
core +1 more source
An Economic Analysis of Difficulty Adjustment Algorithms in Proof‐of‐Work Blockchain Systems
ABSTRACT We study the stability of cryptocurrency systems through difficulty adjustment. Bitcoin's difficulty adjustment algorithm (DAA) exhibits instability when the reward elasticity of the hash rate is high, implying that a sharp price reduction could disrupt the current Bitcoin system.
Shunya Noda +2 more
wiley +1 more source
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world.
Nada Abdul Aziz Mustafa
doaj +1 more source
Medical Image Reliability Verification Using Hash Signatures and Sequential Square Encoding
Increased growth of information technology in healthcare has led to a situation where the security of patient information is more important and is a critical issue.
Ranjani J. Jennifer, Babu M.
doaj +1 more source
Abstract Process information collected from educational games can illuminate how students approach interactive tasks, complementing assessment outcomes routinely examined in evaluation studies. However, the two sources of information are historically analyzed and interpreted separately, and diagnostic process information is often underused.
Tianying Feng, Li Cai
wiley +1 more source
LDPC and SHA based iris recognition for image authentication
We introduce a novel way to authenticate an image using Low Density Parity Check (LDPC) and Secure Hash Algorithm (SHA) based iris recognition method with reversible watermarking scheme, which is based on Integer Wavelet Transform (IWT) and threshold ...
K. Seetharaman, R. Ragupathy
doaj +1 more source
Securing End‐To‐End Encrypted File Sharing Services With the Messaging Layer Security Protocol
ABSTRACT Secure file sharing is essential in today's digital environment, yet many systems remain vulnerable: if an attacker steals client keys, they can often decrypt both past and future content. To address this challenge, we propose a novel file‐sharing architecture that strengthens post‐compromise security while remaining practical.
Roland Helmich, Lars Braubach
wiley +1 more source
Leveraging Sparse Autoencoders to Reveal Interpretable Features in Geophysical Models
Abstract Machine learning is an increasingly popular tool in the geosciences, offering new approaches to numerical weather prediction and complex data set analysis. However, as reliance on these techniques grows, pressing questions about model transparency, internal biases, and trust emerge.
Fraser King +4 more
wiley +1 more source
A Systematic Overview of Caching Mechanisms to Improve Hadoop Performance
ABSTRACT In today's distributed computing environments, the rapid generation of large‐scale data from diverse sources poses significant challenges in terms of storage, management, and processing, particularly for traditional relational databases. Hadoop has emerged as a widely adopted framework for handling such data through parallel processing across ...
Rana Ghazali, Douglas G. Down
wiley +1 more source

