Results 111 to 120 of about 15,909 (208)
Tensor Changepoint Detection and Eigenbootstrap
ABSTRACT Tensor data consisting of multivariate outcomes over the items and across the subjects with longitudinal and cross‐sectional dependence are considered. A completely distribution‐free and tweaking‐parameter‐free detection procedure for changepoints at different locations is designed, which does not require training data.
Michal Pešta +2 more
wiley +1 more source
GCM-SIV1.5: Optimal Tradeoff between GCM-SIV1 and GCM-SIV2. [PDF]
Zhang P.
europepmc +1 more source
Practicing Power‐Sharing: How Political Adversaries (Fail to) Rule Jointly
ABSTRACT Why does power‐sharing lead to peace and effective governance in some cases but not others? Whereas the current literature on this question predominantly focuses on institutional design, this article argues that more attention should be given to the everyday activities, routines and processes through which power‐sharing is operated.
Alexandre Wadih Raffoul
wiley +1 more source
A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF. [PDF]
Jha A, Nandi M.
europepmc +1 more source
A Study of Key Management for Encrypted Storage in Storage Area Network [PDF]
As secure storage becomes more pervasive throughout the enterprise, the focus quickly moves from implementing encrypting storage devices to establishing effective and secure key management policies.
Hai Xin LU
core
OralSegNet: An Approach to Early Detection of Oral Disease Using Transfer Learning
ABSTRACT Objective Deep learning‐based segmentation system is proposed that exploits three variants of YOLOv11 architecture, namely YOLOv11n‐seg, YOLOv11s‐seg, and YOLOv11m‐seg for automated detection and localization of the oral disease conditions from photographic intraoral images.
Pranta Barua +9 more
wiley +1 more source
Multiplex: TBC-Based Authenticated Encryption with Sponge-Like Rate
Authenticated Encryption (AE) modes of operation based on Tweakable Block Ciphers (TBC) usually measure efficiency in the number of calls to the underlying primitive per message block. On the one hand, many existing solutions reach a primitive-rate of 1,
Yaobin Shen +2 more
doaj +1 more source
Bonds on the Ballot: What Voters (Don't) Know About Debt Financing and Why It Matters
Abstract American subnational governments commonly require voters to approve bond proposals, reflecting historical concerns about legislative shortsightedness. Yet voters need an understanding of how bond financing works to make choices consistent with preferences. Existing literature makes it unclear whether voters have such knowledge.
Shanna Pearson‐Merkowitz +3 more
wiley +1 more source
Efficient Implementation of NIST LWC ESTATE Algorithm Using OpenCL and Web Assembly for Secure Communication in Edge Computing Environment. [PDF]
Park B, Seo SC.
europepmc +1 more source
An earlier paper by the same author (IACR Eprint 2008/473) suggested combining a block cipher and a stream cipher to get a strong hybrid cipher. This paper proposes a specific cipher based on those ideas, using the HC-128 stream cipher and a tweakable ...
Sandy Harris
core

