Results 51 to 60 of about 3,272 (163)

Protocol‐Agnostic Meta Key Distribution for Encrypted Wireless Communications Enabled by Space‐Time‐Coding Metasurface

open access: yesAdvanced Science, Volume 13, Issue 7, 3 February 2026.
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li   +7 more
wiley   +1 more source

Regulation Through Revelation: The Effect of Pollution Monitoring on Labour Demand

open access: yesBusiness Strategy and the Environment, Volume 35, Issue 2, Page 2890-2910, February 2026.
ABSTRACT This paper investigates how manufacturing firms respond to a real‐time pollution monitoring programme, with a focus on the implication for employment. Contrary to the conventional expectation that environmental regulations negatively impact business, the findings reveal that enhanced pollution monitoring has a significant and robust positive ...
Tong Zhu, Andreas Löschel
wiley   +1 more source

Analysis and implementation of cryptographic hash functions in programmable logic devices / Kriptografinių maišos funkcijų įgyvendinimo programuojamosios logikos lustuose tyrimas

open access: yesMokslas: Lietuvos Ateitis, 2016
In this day’s world, more and more focused on data protection. For data protection using cryptographic science. It is also important for the safe storage of passwords for this uses a cryptographic hash function.
Tautvydas Brukštus
doaj   +1 more source

Multi‐Channel Neural Interface for Neural Recording and Neuromodulation

open access: yesSmall Methods, Volume 10, Issue 3, 9 February 2026.
This review highlights recent advances in multi‐channel neural interface technologies, covering both high‐resolution electrophysiological recording systems and multifunctional platforms with integrated capabilities. It also discusses innovations in structure and materials for reduced invasiveness, state‐of‐the‐art data analysis, including machine ...
Eunmin Kim   +9 more
wiley   +1 more source

Brute Force Attack pada Algoritma SHA-256

open access: yesTalenta Conference Series: Science and Technology (ST), 2019
Brute force attack adalah salah satu serangan praktis (bersifat praktek) yang dapat digunakan untuk memecahkan teknik pengamanan kriptografi dengan cara mencoba seluruh kemungkinan jawaban/kunci yang ada. Secara umum seluruh jenis algoritma kriptografi dapat dipecahkan dengan menggunakan brute force attack, namun dalam pelaksanaannya brute force attack
openaire   +1 more source

An Economic Analysis of Difficulty Adjustment Algorithms in Proof‐of‐Work Blockchain Systems

open access: yesInternational Economic Review, Volume 67, Issue 1, Page 259-285, February 2026.
ABSTRACT We study the stability of cryptocurrency systems through difficulty adjustment. Bitcoin's difficulty adjustment algorithm (DAA) exhibits instability when the reward elasticity of the hash rate is high, implying that a sharp price reduction could disrupt the current Bitcoin system.
Shunya Noda   +2 more
wiley   +1 more source

SHA-256 Hash Function on Intel DE10 Lite FPGA

open access: yesInternational Journal for Research in Applied Science and Engineering Technology, 2023
Abstract: The SHA-256 hash function is a standardized and trusted algorithm that takes a set of data and produces a unique, deterministic, and irreversible representation called a hash or digest. A component of other protocols, SHA-256 protects password storage, secures and verifies Bitcoin transactions, and authenticates internet communication. We did
Michael DiNardi, Damu Radhakrishnan
openaire   +1 more source

European Code Against Cancer, 5th edition – tobacco and nicotine containing products, second‐hand smoke, alcohol and cancer

open access: yesMolecular Oncology, Volume 20, Issue 1, Page 6-27, January 2026.
The 5th edition of the European Code Against Cancer (ECAC5) contains 14 recommendations on cancer prevention. Here, we update the cancer prevention recommendations on tobacco, second‐hand smoke and alcohol listed as recommendations number 1, 2 and 6. Individuals are advised not to smoke or vape, to quit if they do, keep their home and car smoke‐free ...
Ariadna Feliu   +19 more
wiley   +1 more source

Lycopene's Role in Mitigating Obesity‐Induced Cardiac Remodeling: Insights Into Inflammatory and MMP‐2 Pathways

open access: yesMolecular Nutrition &Food Research, Volume 70, Issue 2, 29 January 2026.
A. Consumption of a highsugar‐fat diet causes excess nutrients, hypertrophy and hyperplasia of adipocytes, causing obesity. Obesity leads to increased inflammatory levels in the heart, which stimulates greater activation of Metalloproteinase‐2 (MMP‐2), which has collagenolytic activity, degrading the collagen network in the heart, ultimately causing ...
Carol Cristina Vagula de Almeida de Silva   +15 more
wiley   +1 more source

From Concept to Practice: A Blockchain‐Based Solution for Secure and Efficient Academic Credentials in Higher Education

open access: yesIET Blockchain, Volume 6, Issue 1, January/December 2026.
This paper addresses the critical need for secure diploma generation and verification in higher education by proposing and detailing the practical implementation of DIAR, a blockchain‐based framework. DIAR leverages blockchain's inherent security features and non‐fungible tokens for efficient, cost‐effective and tamper‐proof credential management ...
Avni Rustemi, Fisnik Dalipi
wiley   +1 more source

Home - About - Disclaimer - Privacy