Results 61 to 70 of about 13,790 (198)
Secure Communications using Nonlinear Silicon Photonic Keys
We present a secure communication system constructed using pairs of nonlinear photonic physical unclonable functions (PUFs) that harness physical chaos in integrated silicon micro-cavities.
Bosworth, Bryan T. +5 more
core +1 more source
A Blockchain‐Less Traceability System for Agriculture Using DAG, IPFS, and Serverless Deployments
ABSTRACT Ensuring transparency and integrity in agricultural data management is a critical challenge as the sector increasingly relies on advanced technologies. The primary problem is maintaining data traceability and security throughout the supply chain.
Antonio Villafranca +6 more
wiley +1 more source
ABSTRACT Temperature is an important factor affecting daily life, and accurate multi‐step temperature prediction can provide essential support for weather prediction, energy management, agricultural planning, and disaster mitigation. However, as the prediction horizon extends, the nonlinear nature of temperature data becomes more prominent, making it ...
Baohe Liu +4 more
wiley +1 more source
Implementing TontineCoin [PDF]
One of the alternatives to proof-of-work (PoW) consensus protocols is proof-of- stake (PoS) protocols, which address its energy and cost related issues. But they suffer from the nothing-at-stake problem; validators (PoS miners) are bound to lose nothing ...
Pardeshi, Prashant
core +1 more source
Halopithys incurva is a red macroalga distributed across the Mediterranean Sea and North‐East Atlantic, with occasional reports from the Indian Ocean. It exhibits a rich chemical diversity, including isoflavones, bromophenols, MAAs, pigments, phycobiliproteins, primary metabolites, and neuroactive compounds.
Youssra Aalilou +9 more
wiley +1 more source
Hybrid Techniques for Shared File Security in Cloud Environment Using SHA-256
This research examines file protection in cloud environments using the SHA-256 algorithm. It evaluates secure hash variants in file transfer systems, aiming to improve throughput while meeting security requirements.
AlKhazaleh Alaa +5 more
doaj +1 more source
ABSTRACT Background and Aims Computer vision syndrome (CVS) is a recognised health concern characterized by eye and vision‐related symptoms resulting from prolonged use of digital devices. Approximately 60 million people worldwide are affected by CVS, with almost one million new cases reported annually.
Hasan Nabil Alhouri +11 more
wiley +1 more source
Cryptography Engine Design for IEEE 1609.2 WAVE Secure Vehicle Communication using FPGA [PDF]
Department Of Electrical EngineeringIn this paper, we implement the IEEE 1609.2 secure vehicle communication (VC) standard using FPGA by fast and efficient ways. Nowadays, smart vehicle get nearer to our everyday life.
Jeong, Chanbok
core
Brute Force Attack pada Algoritma SHA-256
Brute force attack adalah salah satu serangan praktis (bersifat praktek) yang dapat digunakan untuk memecahkan teknik pengamanan kriptografi dengan cara mencoba seluruh kemungkinan jawaban/kunci yang ada. Secara umum seluruh jenis algoritma kriptografi dapat dipecahkan dengan menggunakan brute force attack, namun dalam pelaksanaannya brute force attack
openaire +1 more source
Abstract Just Energy Transition Partnerships (JETPs) are novel financing mechanisms that encourage coal‐dependent emerging economies to transition away from fossil fuels. JETPs aim to facilitate coal phaseout and transitions to renewable energy through private and public financing.
Francine Hug
wiley +1 more source

