Results 21 to 30 of about 966 (158)

AuCPace: Efficient verifier-based PAKE protocol tailored for the IIoT

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
Increasingly connectivity becomes integrated in products and devices that previously operated in a stand-alone setting. This observation holds for many consumer applications in the so-called "Internet of Things" (IoT) as well as for corresponding ...
Björn Haase, Benoît Labrique
doaj   +1 more source

Heat and Cold Waves in Brazil: An ERA5‐Based Analysis of Trends and Seasonality (1980–2024)

open access: yesInternational Journal of Climatology, EarlyView.
This study uses ERA5 reanalysis data to assess changes in extreme heat and cold events across Brazil from 1980 to 2024. Results reveal a sharp increase in heatwave frequency and a general decline in coldwave occurrences, though regional variations are substantial.
Alindomar Lacerda Silva, Scott Sheridan
wiley   +1 more source

Tolerating Sensitive-Leakage With Larger Plaintext-Space and Higher Leakage-Rate in Privacy-Aware Internet-of-Things

open access: yesIEEE Access, 2018
When executing a program or storing data in a medical Internet of Things (mIoT) system, physical side-channels analysis, such as recent-timing, cold-reboot, and virtual-machine attacks, might obtain partial information about internal sensitive medical ...
Mingwu Zhang   +3 more
doaj   +1 more source

Quantifying Structural Complexity, Effort, and Performance: An Early Experiment Using Network Design Tasks

open access: yesSystems Engineering, EarlyView.
ABSTRACT Structural Complexity is perceived as driving cost in system development, yet managing it effectively requires empirical understanding. This study investigates human decision‐making using a toy transportation‐style network design task, focusing on how Structural Complexity, Effort, and Performance interact. Seventy‐four participants (primarily
Alfonso Lanza   +3 more
wiley   +1 more source

Hash Tables as Engines of Randomness at the Limits of Computation: A Unified Review of Algorithms

open access: yesAlgorithms
Hash tables embody a paradox of deterministic structure that emerges from controlled randomness. They have evolved from simple associative arrays into algorithmic engines that operate near the physical and probabilistic limits of computation. This review
Paul A. Gagniuc, Mihai Togan
doaj   +1 more source

Tumour‐informed workflow to use ctDNA as a biomarker for risk of recurrence in head and neck cancer patients post‐treatment

open access: yesVIEW, EarlyView.
Our study presents a tumour‐informed circulating tumour DNA (ctDNA) workflow designed to enhance the detection of recurrence in head and neck cancer patients, addressing key challenges such as low ctDNA tumour fractions and tumour heterogeneity. Abstract Circulating tumour DNA (ctDNA) is a promising minimally invasive biomarker for monitoring treatment
Xiaomin Huang   +8 more
wiley   +1 more source

A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis   +7 more
wiley   +1 more source

Hashing to detect identical ordering of species in a shared sublattice

open access: yesScience and Technology of Advanced Materials: Methods
Finding very low energy configurations of species on a shared sublattice is unavoidable in some problems governed by ground states of the sublattice, such as voltage curve estimation of battery cathode materials. Calculations of partial occupancy systems,
Yoyo Hinuma
doaj   +1 more source

Universal Hashing and Multiple Authentication [PDF]

open access: yes, 1996
In this paper, we study unconditionally secure codes that provide authentication without secrecy. Our point of view is the universal hashing approach pioneered by Wegman and Carter in 1981. We first compare several recent universal-hashing based constructions for authentication codes.
M. Atici, D. R. Stinson
openaire   +1 more source

Entrepreneurial Market Leadership Claims, Cultural Resonance, and Investor Evaluations in Nascent Markets: The Goldilocks Effect

open access: yesJournal of Management Studies, EarlyView.
Abstract Cultural entrepreneurship research emphasizes entrepreneurs’ use of cultural resources to influence audience evaluations through resonance. However, the process by which such cultural resonance is achieved remains underexplored, particularly as an intermediary outcome.
Xiumei Li   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy