Results 51 to 60 of about 3,272 (163)
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li +7 more
wiley +1 more source
Regulation Through Revelation: The Effect of Pollution Monitoring on Labour Demand
ABSTRACT This paper investigates how manufacturing firms respond to a real‐time pollution monitoring programme, with a focus on the implication for employment. Contrary to the conventional expectation that environmental regulations negatively impact business, the findings reveal that enhanced pollution monitoring has a significant and robust positive ...
Tong Zhu, Andreas Löschel
wiley +1 more source
In this day’s world, more and more focused on data protection. For data protection using cryptographic science. It is also important for the safe storage of passwords for this uses a cryptographic hash function.
Tautvydas Brukštus
doaj +1 more source
Multi‐Channel Neural Interface for Neural Recording and Neuromodulation
This review highlights recent advances in multi‐channel neural interface technologies, covering both high‐resolution electrophysiological recording systems and multifunctional platforms with integrated capabilities. It also discusses innovations in structure and materials for reduced invasiveness, state‐of‐the‐art data analysis, including machine ...
Eunmin Kim +9 more
wiley +1 more source
Brute Force Attack pada Algoritma SHA-256
Brute force attack adalah salah satu serangan praktis (bersifat praktek) yang dapat digunakan untuk memecahkan teknik pengamanan kriptografi dengan cara mencoba seluruh kemungkinan jawaban/kunci yang ada. Secara umum seluruh jenis algoritma kriptografi dapat dipecahkan dengan menggunakan brute force attack, namun dalam pelaksanaannya brute force attack
openaire +1 more source
An Economic Analysis of Difficulty Adjustment Algorithms in Proof‐of‐Work Blockchain Systems
ABSTRACT We study the stability of cryptocurrency systems through difficulty adjustment. Bitcoin's difficulty adjustment algorithm (DAA) exhibits instability when the reward elasticity of the hash rate is high, implying that a sharp price reduction could disrupt the current Bitcoin system.
Shunya Noda +2 more
wiley +1 more source
SHA-256 Hash Function on Intel DE10 Lite FPGA
Abstract: The SHA-256 hash function is a standardized and trusted algorithm that takes a set of data and produces a unique, deterministic, and irreversible representation called a hash or digest. A component of other protocols, SHA-256 protects password storage, secures and verifies Bitcoin transactions, and authenticates internet communication. We did
Michael DiNardi, Damu Radhakrishnan
openaire +1 more source
The 5th edition of the European Code Against Cancer (ECAC5) contains 14 recommendations on cancer prevention. Here, we update the cancer prevention recommendations on tobacco, second‐hand smoke and alcohol listed as recommendations number 1, 2 and 6. Individuals are advised not to smoke or vape, to quit if they do, keep their home and car smoke‐free ...
Ariadna Feliu +19 more
wiley +1 more source
A. Consumption of a highsugar‐fat diet causes excess nutrients, hypertrophy and hyperplasia of adipocytes, causing obesity. Obesity leads to increased inflammatory levels in the heart, which stimulates greater activation of Metalloproteinase‐2 (MMP‐2), which has collagenolytic activity, degrading the collagen network in the heart, ultimately causing ...
Carol Cristina Vagula de Almeida de Silva +15 more
wiley +1 more source
This paper addresses the critical need for secure diploma generation and verification in higher education by proposing and detailing the practical implementation of DIAR, a blockchain‐based framework. DIAR leverages blockchain's inherent security features and non‐fungible tokens for efficient, cost‐effective and tamper‐proof credential management ...
Avni Rustemi, Fisnik Dalipi
wiley +1 more source

