Results 81 to 90 of about 153,790 (328)
An Ecosystem to Develop Multi‐Agent Systems in Real‐World IoT Applications
ABSTRACT Software agents and multi‐agent systems are critical components in the development of distributed autonomous systems, as they exhibit a wide range of “intelligence,” from reactive behaviors to advanced reasoning and planning. Integrating these capabilities into multi‐agent systems enables distributed artificial intelligence, a programming ...
Davide Carnemolla +3 more
wiley +1 more source
Key derivation function: key-hash based computational extractor and stream based pseudorandom expander [PDF]
The key derivation function is a specific cryptographic algorithm that transforms private string and public strings into one or more cryptographic keys.
Chai Wen Chuah +2 more
doaj +2 more sources
Robust Hashing Based on Quaternion Gyrator Transform for Image Authentication
Image hashing is one of the most effective methods in many image processing applications including image recognition or authentication, tampering detection, image retrieval, etc.
Junlin Ouyang, Xiao Zhang, Xingzi Wen
doaj +1 more source
SIG-DB: leveraging homomorphic encryption to Securely Interrogate privately held Genomic DataBases
Genomic data are becoming increasingly valuable as we develop methods to utilize the information at scale and gain a greater understanding of how genetic information relates to biological function.
Flower, Audrey +8 more
core +2 more sources
Converting Binary Floating‐Point Numbers to Shortest Decimal Strings: An Experimental Review
ABSTRACT Background When sharing or logging numerical data, we must convert binary floating‐point numbers into their decimal string representations. For example, the number π might become 3.1415927. Engineers have perfected many algorithms for producing such accurate, short strings.
Jaël Champagne Gareau, Daniel Lemire
wiley +1 more source
Short signature based on factoring problem in the standard model
A short signature scheme based on factoring problem in the standard model was proposed.To design this sig-nature scheme,the generic construction of fully-secure signatures from weakly-secure signatures and a chameleon hash were employed.A signature in ...
WANG Zhi-wei1, ZHANG Wei1
doaj +2 more sources
Motivated by the problem of simultaneously preserving confidentiality and usability of data outsourced to third-party clouds, we present two different database encryption schemes that largely hide data but reveal enough information to support a wide ...
Basin D. +8 more
core +1 more source
ABSTRACT Structural Complexity is perceived as driving cost in system development, yet managing it effectively requires empirical understanding. This study investigates human decision‐making using a toy transportation‐style network design task, focusing on how Structural Complexity, Effort, and Performance interact. Seventy‐four participants (primarily
Alfonso Lanza +3 more
wiley +1 more source
Privacy amplification is a critical component in quantum key distribution (QKD) to eliminate eavesdropper information and distill unconditionally secure keys.
Encheng Tian +6 more
doaj +1 more source
S-GoSV: Framework for Generating Secure IEC 61850 GOOSE and Sample Value Messages
Standardized communication plays an important role in substation automation system (SAS). IEC 61850 is a de-facto standard in SAS. It facilitates smooth communication between different devices located in the substation by achieving interoperability ...
Shaik Mullapathi Farooq +2 more
doaj +1 more source

