Results 21 to 30 of about 966 (158)
AuCPace: Efficient verifier-based PAKE protocol tailored for the IIoT
Increasingly connectivity becomes integrated in products and devices that previously operated in a stand-alone setting. This observation holds for many consumer applications in the so-called "Internet of Things" (IoT) as well as for corresponding ...
Björn Haase, Benoît Labrique
doaj +1 more source
Heat and Cold Waves in Brazil: An ERA5‐Based Analysis of Trends and Seasonality (1980–2024)
This study uses ERA5 reanalysis data to assess changes in extreme heat and cold events across Brazil from 1980 to 2024. Results reveal a sharp increase in heatwave frequency and a general decline in coldwave occurrences, though regional variations are substantial.
Alindomar Lacerda Silva, Scott Sheridan
wiley +1 more source
When executing a program or storing data in a medical Internet of Things (mIoT) system, physical side-channels analysis, such as recent-timing, cold-reboot, and virtual-machine attacks, might obtain partial information about internal sensitive medical ...
Mingwu Zhang +3 more
doaj +1 more source
ABSTRACT Structural Complexity is perceived as driving cost in system development, yet managing it effectively requires empirical understanding. This study investigates human decision‐making using a toy transportation‐style network design task, focusing on how Structural Complexity, Effort, and Performance interact. Seventy‐four participants (primarily
Alfonso Lanza +3 more
wiley +1 more source
Hash Tables as Engines of Randomness at the Limits of Computation: A Unified Review of Algorithms
Hash tables embody a paradox of deterministic structure that emerges from controlled randomness. They have evolved from simple associative arrays into algorithmic engines that operate near the physical and probabilistic limits of computation. This review
Paul A. Gagniuc, Mihai Togan
doaj +1 more source
Our study presents a tumour‐informed circulating tumour DNA (ctDNA) workflow designed to enhance the detection of recurrence in head and neck cancer patients, addressing key challenges such as low ctDNA tumour fractions and tumour heterogeneity. Abstract Circulating tumour DNA (ctDNA) is a promising minimally invasive biomarker for monitoring treatment
Xiaomin Huang +8 more
wiley +1 more source
A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis +7 more
wiley +1 more source
Hashing to detect identical ordering of species in a shared sublattice
Finding very low energy configurations of species on a shared sublattice is unavoidable in some problems governed by ground states of the sublattice, such as voltage curve estimation of battery cathode materials. Calculations of partial occupancy systems,
Yoyo Hinuma
doaj +1 more source
Universal Hashing and Multiple Authentication [PDF]
In this paper, we study unconditionally secure codes that provide authentication without secrecy. Our point of view is the universal hashing approach pioneered by Wegman and Carter in 1981. We first compare several recent universal-hashing based constructions for authentication codes.
M. Atici, D. R. Stinson
openaire +1 more source
Abstract Cultural entrepreneurship research emphasizes entrepreneurs’ use of cultural resources to influence audience evaluations through resonance. However, the process by which such cultural resonance is achieved remains underexplored, particularly as an intermediary outcome.
Xiumei Li +3 more
wiley +1 more source

