期刊文献+
共找到763篇文章
< 1 2 39 >
每页显示 20 50 100
Glia-to-neuron reprogramming to the rescue?
1
作者 Jack W.Hickmott Cindi M.Morshead 《Neural Regeneration Research》 SCIE CAS 2025年第5期1395-1396,共2页
Over the last two decades,the dogma that cell fate is immutable has been increasingly challenged,with important implications for regenerative medicine.The brea kth rough discovery that induced pluripotent stem cells c... Over the last two decades,the dogma that cell fate is immutable has been increasingly challenged,with important implications for regenerative medicine.The brea kth rough discovery that induced pluripotent stem cells could be generated from adult mouse fibroblasts is powerful proof that cell fate can be changed.An exciting extension of the discovery of cell fate impermanence is the direct cellular reprogram ming hypothesis-that terminally differentiated cells can be reprogrammed into other adult cell fates without first passing through a stem cell state. 展开更多
关键词 programming PASSING proof
暂未订购
Corrigendum: MicroRNA-502-3p regulates GABAergic synapse function in hippocampal neurons
2
《Neural Regeneration Research》 SCIE CAS 2025年第4期945-945,共1页
There is an error in the name of the cell line in the abstract of the published paper“MicroRNA-502-3p regulates GABAergic synapse function in hippocampal neurons”published on pages 2698-2707,Issue 12,Volume 19 of Ne... There is an error in the name of the cell line in the abstract of the published paper“MicroRNA-502-3p regulates GABAergic synapse function in hippocampal neurons”published on pages 2698-2707,Issue 12,Volume 19 of Neural Regeneration Research(Sharma et al.,2024),because of oversight during final proof checking.The correct description should be“human-GABA receptor A-α1/β2/γ2L human embryonic kidney(HEK)recombinant cell line.”The authors apologize for any inconvenience this correction may cause for readers and editors of Neural Regeneration Research. 展开更多
关键词 FUNCTION PROOF correction
在线阅读 下载PDF
Towards Net Zero Resilience: A Futuristic Architectural Strategy for Cyber-Attack Defence in Industrial Control Systems (ICS) and Operational Technology (OT) 被引量:1
3
作者 Hariharan Ramachandran Richard Smith +2 位作者 Kenny Awuson David Tawfik Al-Hadhrami Parag Acharya 《Computers, Materials & Continua》 2025年第2期3619-3641,共23页
This paper introduces the Integrated Security Embedded Resilience Architecture (ISERA) as an advanced resilience mechanism for Industrial Control Systems (ICS) and Operational Technology (OT) environments. The ISERA f... This paper introduces the Integrated Security Embedded Resilience Architecture (ISERA) as an advanced resilience mechanism for Industrial Control Systems (ICS) and Operational Technology (OT) environments. The ISERA framework integrates security by design principles, micro-segmentation, and Island Mode Operation (IMO) to enhance cyber resilience and ensure continuous, secure operations. The methodology deploys a Forward-Thinking Architecture Strategy (FTAS) algorithm, which utilises an industrial Intrusion Detection System (IDS) implemented with Python’s Network Intrusion Detection System (NIDS) library. The FTAS algorithm successfully identified and responded to cyber-attacks, ensuring minimal system disruption. ISERA has been validated through comprehensive testing scenarios simulating Denial of Service (DoS) attacks and malware intrusions, at both the IT and OT layers where it successfully mitigates the impact of malicious activity. Results demonstrate ISERA’s efficacy in real-time threat detection, containment, and incident response, thus ensuring the integrity and reliability of critical infrastructure systems. ISERA’s decentralised approach contributes to global net zero goals by optimising resource use and minimising environmental impact. By adopting a decentralised control architecture and leveraging virtualisation, ISERA significantly enhances the cyber resilience and sustainability of critical infrastructure systems. This approach not only strengthens defences against evolving cyber threats but also optimises resource allocation, reducing the system’s carbon footprint. As a result, ISERA ensures the uninterrupted operation of essential services while contributing to broader net zero goals. 展开更多
关键词 ICS/OT cyber Programmable Logic Controllers(PLC)security detection safety reliability proof testing gas compressor station ICS resilience security architecture ICS
在线阅读 下载PDF
Mathematical Analysis and Simulation of Secure Information Transmission and Processing Model
4
作者 Ren Quan Wu Jiangxing He Lei 《China Communications》 2025年第3期181-201,共21页
The security of information transmission and processing due to unknown vulnerabilities and backdoors in cyberspace is becoming increasingly problematic.However,there is a lack of effective theory to mathematically dem... The security of information transmission and processing due to unknown vulnerabilities and backdoors in cyberspace is becoming increasingly problematic.However,there is a lack of effective theory to mathematically demonstrate the security of information transmission and processing under nonrandom noise(or vulnerability backdoor attack)conditions in cyberspace.This paper first proposes a security model for cyberspace information transmission and processing channels based on error correction coding theory.First,we analyze the fault tolerance and non-randomness problem of Dynamic Heterogeneous Redundancy(DHR)structured information transmission and processing channel under the condition of non-random noise or attacks.Secondly,we use a mathematical statistical method to demonstrate that for non-random noise(or attacks)on discrete memory channels,there exists a DHR-structured channel and coding scheme that enables the average system error probability to be arbitrarily small.Finally,to construct suitable coding and heterogeneous channels,we take Turbo code as an example and simulate the effects of different heterogeneity,redundancy,output vector length,verdict algorithm and dynamism on the system,which is an important guidance for theory and engineering practice. 展开更多
关键词 coding theory information systems mod-eling non-random noise security proof
在线阅读 下载PDF
一个多元函数最值问题的推广
5
作者 聂琳峻 《中等数学》 2025年第3期31-32,共2页
题目已知a、b、c∈[1,2].求证:a^(3)+b^(3)+c^(3)≤5abc.证明不妨设a≥b≥c.设f(a,b,c)=a^(3)+b^(3)+c^(3)-5abc.则f(a,b,1)-f(a,b,c)=1-c^(3)+5abc-5ab=(1-c)(1+c+c^(2)-5ab).
关键词 INEQUALITIES OPTIMIZATION multivariate functions proof techniques
在线阅读 下载PDF
Quantum-Resilient Blockchain for Secure Digital Identity Verification in DeFi
6
作者 Ahmed I.Alutaibi 《Computers, Materials & Continua》 2025年第10期875-903,共29页
The rapid evolution of quantum computing poses significant threats to traditional cryptographic schemes,particularly in Decentralized Finance(DeFi)systems that rely on legacy mechanisms like RSA and ECDSA for digital ... The rapid evolution of quantum computing poses significant threats to traditional cryptographic schemes,particularly in Decentralized Finance(DeFi)systems that rely on legacy mechanisms like RSA and ECDSA for digital identity verification.This paper proposes a quantum-resilient,blockchain-based identity verification framework designed to address critical challenges in privacy preservation,scalability,and post-quantum security.The proposed model integrates Post-quantum Cryptography(PQC),specifically lattice-based cryptographic primitives,with Decentralized Identifiers(DIDs)and Zero-knowledge Proofs(ZKPs)to ensure verifiability,anonymity,and resistance to quantum attacks.A dual-layer architecture is introduced,comprising an identity layer for credential generation and validation,and an application layer for DeFi protocol integration.To evaluate its performance,the framework is tested on multiple real-world DeFi platforms using metrics such as verification latency,throughput,attack resistance,energy efficiency,and quantum attack simulation.The results demonstrate that the proposed framework achieves 90%latency reduction and over 35%throughput improvement compared to traditional blockchain identity solutions.It also exhibits a high quantum resistance score(95/100),with successful secure verification under simulated quantum adversaries.The revocation mechanism—implemented using Merkle-tree-based proofs—achieves average response times under 40 ms,and the system maintains secure operations with energy consumption below 9 J per authentication cycle.Additionally,the paper presents a security and cost tradeoff analysis using ZKP schemes such as Bulletproofs and STARKs,revealing superior bits-per-byte efficiency and reduced proof sizes.Real-world adoption scenarios,including integration with six major DeFi protocols,indicate a 25%increase in verified users and a 15%improvement in Total Value Locked(TVL).The proposed solution is projected to remain secure until 2041(basic version)and 2043(advanced version),ensuring long-term sustainability and future-proofing against evolving quantum threats.This work establishes a scalable,privacy-preserving identity model that aligns with emerging post-quantum security standards for decentralized ecosystems. 展开更多
关键词 Quantum-resistant cryptography decentralized identity DeFi blockchain zero-knowledge proofs post-quantum security lattice-based encryption
在线阅读 下载PDF
A Novel Approach to Estimating Proof Test Coverage for Emergency Shutdown Valves using a Fuzzy Inference System
7
作者 Steve Kriescher Roderick Thomas +2 位作者 Chris Phillips Neil Mac Parthaláin David J.Smith 《Journal of Dynamics, Monitoring and Diagnostics》 2025年第1期44-52,共9页
Published proof test coverage(PTC)estimates for emergency shutdown valves(ESDVs)show only moderate agreement and are predominantly opinion-based.A Failure Modes,Effects,and Diagnostics Analysis(FMEDA)was undertaken us... Published proof test coverage(PTC)estimates for emergency shutdown valves(ESDVs)show only moderate agreement and are predominantly opinion-based.A Failure Modes,Effects,and Diagnostics Analysis(FMEDA)was undertaken using component failure rate data to predict PTC for a full stroke test and a partial stroke test.Given the subjective and uncertain aspects of the FMEDA approach,specifically the selection of component failure rates and the determination of the probability of detecting failure modes,a Fuzzy Inference System(FIS)was proposed to manage the data,addressing the inherent uncertainties.Fuzzy inference systems have been used previously for various FMEA type assessments,but this is the first time an FIS has been employed for use with FMEDA.ESDV PTC values were generated from both the standard FMEDA and the fuzzy-FMEDA approaches using data provided by FMEDA experts.This work demonstrates that fuzzy inference systems can address the subjectivity inherent in FMEDA data,enabling reliable estimates of ESDV proof test coverage for both full and partial stroke tests.This facilitates optimized maintenance planning while ensuring safety is not compromised. 展开更多
关键词 emergency shutdown valves failure modes effects diagnostics analysis fuzzy inference systems proof test coverage
在线阅读 下载PDF
A lightweight dual authentication scheme for V2V communication in 6G-based vanets
8
作者 Xia Feng Yaru Wang +1 位作者 Kaiping Cui Liangmin Wang 《Digital Communications and Networks》 2025年第4期1224-1235,共12页
The advancement of 6G wireless communication technology has facilitated the integration of Vehicular Ad-hoc Networks(VANETs).However,the messages transmitted over the public channel in the open and dynamic VANETs are ... The advancement of 6G wireless communication technology has facilitated the integration of Vehicular Ad-hoc Networks(VANETs).However,the messages transmitted over the public channel in the open and dynamic VANETs are vulnerable to malicious attacks.Although numerous researchers have proposed authentication schemes to enhance the security of Vehicle-to-Vehicle(V2V)communication,most existing methodologies face two significant challenges:(1)the majority of the schemes are not lightweight enough to support realtime message interaction among vehicles;(2)the sensitive information like identity and position is at risk of being compromised.To tackle these issues,we propose a lightweight dual authentication protocol for V2V communication based on Physical Unclonable Function(PUF).The proposed scheme accomplishes dual authentication between vehicles by the combination of Zero-Knowledge Proof(ZKP)and MASK function.The security analysis proves that our scheme provides both anonymous authentication and information unlinkability.Additionally,the performance analysis demonstrates that the computation overhead of our scheme is approximately reduced 23.4% compared to the state-of-the-art schemes.The practical simulation conducted in a 6G network environment demonstrates the feasibility of 6G-based VANETs and their potential for future advancements. 展开更多
关键词 Vehicular ad-hoc network Identity authentication Physical unclonable function MASK function Zero-knowledge proof 6G wireless communication technology
在线阅读 下载PDF
Nature子刊:3类食品让糖尿病风险至少增加11%
9
《糖尿病之友》 2025年第9期7-7,共1页
2025年6月30日,华盛顿大学研究团队在《Nature Medicine》期刊上发表了一篇题为《Health effects associated with consumption of processed meat,sugar-sweetened beverages and trans fatty acids:a Burden of Proof study》的研究... 2025年6月30日,华盛顿大学研究团队在《Nature Medicine》期刊上发表了一篇题为《Health effects associated with consumption of processed meat,sugar-sweetened beverages and trans fatty acids:a Burden of Proof study》的研究论文。研究结果发现,与不摄入加工肉类相比,每天摄入0.6~57克加工肉类,患2型糖尿病的风险平均至少高11%。 展开更多
关键词 Burden of Proof研究 加工肉类 糖甜饮料
原文传递
Polynomial Commitment in a Verkle Tree Based on a Non-Positional Polynomial Notation
10
作者 Kunbolat T.Algazy Kairat S.Sakan +1 位作者 Saule E.Nyssanbayeva Ardabek Khompysh 《Computers, Materials & Continua》 2025年第7期1581-1595,共15页
This paper examines the application of the Verkle tree—an efficient data structure that leverages commitments and a novel proof technique in cryptographic solutions.Unlike traditional Merkle trees,the Verkle tree sig... This paper examines the application of the Verkle tree—an efficient data structure that leverages commitments and a novel proof technique in cryptographic solutions.Unlike traditional Merkle trees,the Verkle tree significantly reduces signature size by utilizing polynomial and vector commitments.Compact proofs also accelerate the verification process,reducing computational overhead,which makes Verkle trees particularly useful.The study proposes a new approach based on a non-positional polynomial notation(NPN)employing the Chinese Remainder Theorem(CRT).CRT enables efficient data representation and verification by decomposing data into smaller,indepen-dent components,simplifying computations,reducing overhead,and enhancing scalability.This technique facilitates parallel data processing,which is especially advantageous in cryptographic applications such as commitment and proof construction in Verkle trees,as well as in systems with constrained computational resources.Theoretical foundations of the approach,its advantages,and practical implementation aspects are explored,including resistance to potential attacks,application domains,and a comparative analysis with existing methods based on well-known parameters and characteristics.An analysis of potential attacks and vulnerabilities,including greatest common divisor(GCD)attacks,approximate multiple attacks(LLL lattice-based),brute-force search for irreducible polynomials,and the estimation of their total number,indicates that no vulnerabilities have been identified in the proposed method thus far.Furthermore,the study demonstrates that integrating CRT with Verkle trees ensures high scalability,making this approach promising for blockchain systems and other distributed systems requiring compact and efficient proofs. 展开更多
关键词 Verkle tree Verkle tree commitment and proof non-positional polynomial notation(NPN) Chinese remainder theorem
在线阅读 下载PDF
Environmental Friendly Route and Wool Shrink Proofing
11
作者 朱泉 吴婵娟 《Journal of Donghua University(English Edition)》 EI CAS 2003年第2期14-17,共4页
The shrink proofing on wool with treatment of protease named Argaenzyme STL was studied. The various pretreating auxiliaries, different parameters for protease treating process and the effect of stabilizer were discus... The shrink proofing on wool with treatment of protease named Argaenzyme STL was studied. The various pretreating auxiliaries, different parameters for protease treating process and the effect of stabilizer were discussed in detail. The varieties of some properties before and after protease treatment were also investigated. 展开更多
关键词 PROTEASE WOOL stabilizer pretreating auxiliary shrink proofing
在线阅读 下载PDF
Thermally Conductive and UV-EMI Shielding Electronic Textiles for Unrestricted and Multifaceted Health Monitoring 被引量:3
12
作者 Yidong Peng Jiancheng Dong +8 位作者 Jiayan Long Yuxi Zhang Xinwei Tang Xi Lin Haoran Liu Tuoqi Liu Wei Fan Tianxi Liu Yunpeng Huang 《Nano-Micro Letters》 SCIE EI CAS CSCD 2024年第10期149-162,共14页
Skin-attachable electronics have garnered considerable research attention in health monitoring and artificial intelligence domains,whereas susceptibility to elec-tromagnetic interference(EMI),heat accumulation issues,... Skin-attachable electronics have garnered considerable research attention in health monitoring and artificial intelligence domains,whereas susceptibility to elec-tromagnetic interference(EMI),heat accumulation issues,and ultraviolet(UV)-induced aging problems pose significant constraints on their potential applications.Here,an ultra-elas-tic,highly breathable,and thermal-comfortable epidermal sensor with exceptional UV-EMI shielding performance and remarkable thermal conductivity is developed for high-fidelity monitoring of multiple human electrophysiological signals.Via filling the elastomeric microfibers with thermally conductive boron nitride nanoparticles and bridging the insulating fiber interfaces by plating Ag nanoparticles(NPs),an interwoven thermal con-ducting fiber network(0.72 W m^(-1) K^(-1))is constructed benefiting from the seamless thermal interfaces,facilitating unimpeded heat dissipation for comfort skin wearing.More excitingly,the elastomeric fiber substrates simultaneously achieve outstanding UV protection(UPF=143.1)and EMI shielding(SET>65,X-band)capabilities owing to the high electrical conductivity and surface plasmon resonance of Ag NPs.Furthermore,an electronic textile prepared by printing liquid metal on the UV-EMI shielding and thermally conductive nonwoven textile is finally utilized as an advanced epidermal sensor,which succeeds in monitoring different electrophysiological signals under vigorous electromagnetic interference.This research paves the way for developing protective and environmentally adaptive epidermal electronics for next-generation health regulation. 展开更多
关键词 Skin electronics Thermal regulating textiles Electromagnetic interference shielding Ultraviolet proof Health monitoring
在线阅读 下载PDF
Recurrent Neural Network Inspired Finite-Time Control Design 被引量:1
13
作者 Jianan Liu Shihua Li Rongjie Liu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第6期1527-1529,共3页
Dear Editor,This letter is concerned with the role of recurrent neural networks(RNNs)on the controller design for a class of nonlinear systems.Inspired by the architectures of RNNs,the system states are stacked accord... Dear Editor,This letter is concerned with the role of recurrent neural networks(RNNs)on the controller design for a class of nonlinear systems.Inspired by the architectures of RNNs,the system states are stacked according to the dynamic along with time while the controller is represented as the neural network output.To build the bridge between RNNs and finite-time controller,a novel activation function is imposed on RNNs to drive the convergence of states at finite-time and propel the overall control process smoother.Rigorous stability proof is briefly provided for the convergence of the proposed finite-time controller.At last,a numerical simulation example is presented to illustrate the efficiency of the proposed strategy.Neural networks can be classified as static(feedforward)and dynamic(recurrent)nets[1].The former nets do not perform well in dealing with training data and using any information of the local data structure[2].In contrast to the feedforward neural networks,RNNs are constituted by high dimensional hidden states with dynamics. 展开更多
关键词 DYNAMICS FINITE PROOF
在线阅读 下载PDF
A Blockchain-Based Efficient Cross-Domain Authentication Scheme for Internet of Vehicles 被引量:1
14
作者 Feng Zhao Hongtao Ding +3 位作者 Chunhai Li Zhaoyu Su Guoling Liang Changsong Yang 《Computers, Materials & Continua》 SCIE EI 2024年第7期567-585,共19页
The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and varia... The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and variable nature of its network topology,vehicles frequently engage in cross-domain interactions.During such processes,directly uploading sensitive information to roadside units for interaction may expose it to malicious tampering or interception by attackers,thus compromising the security of the cross-domain authentication process.Additionally,IoV imposes high real-time requirements,and existing cross-domain authentication schemes for IoV often encounter efficiency issues.To mitigate these challenges,we propose CAIoV,a blockchain-based efficient cross-domain authentication scheme for IoV.This scheme comprehensively integrates technologies such as zero-knowledge proofs,smart contracts,and Merkle hash tree structures.It divides the cross-domain process into anonymous cross-domain authentication and safe cross-domain authentication phases to ensure efficiency while maintaining a balance between efficiency and security.Finally,we evaluate the performance of CAIoV.Experimental results demonstrate that our proposed scheme reduces computational overhead by approximately 20%,communication overhead by around 10%,and storage overhead by nearly 30%. 展开更多
关键词 Blockchain cross-domain authentication internet of vehicle zero-knowledge proof
在线阅读 下载PDF
A Fair and Trusted Trading Scheme for Medical Data Based on Smart Contracts 被引量:1
15
作者 Xiaohui Yang Kun Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第2期1843-1859,共17页
Data is regarded as a valuable asset,and sharing data is a prerequisite for fully exploiting the value of data.However,the current medical data sharing scheme lacks a fair incentive mechanism,and the authenticity of d... Data is regarded as a valuable asset,and sharing data is a prerequisite for fully exploiting the value of data.However,the current medical data sharing scheme lacks a fair incentive mechanism,and the authenticity of data cannot be guaranteed,resulting in low enthusiasm of participants.A fair and trusted medical data trading scheme based on smart contracts is proposed,which aims to encourage participants to be honest and improve their enthusiasm for participation.The scheme uses zero-knowledge range proof for trusted verification,verifies the authenticity of the patient’s data and the specific attributes of the data before the transaction,and realizes privacy protection.At the same time,the game pricing strategy selects the best revenue strategy for all parties involved and realizes the fairness and incentive of the transaction price.The smart contract is used to complete the verification and game bargaining process,and the blockchain is used as a distributed ledger to record the medical data transaction process to prevent data tampering and transaction denial.Finally,by deploying smart contracts on the Ethereum test network and conducting experiments and theoretical calculations,it is proved that the transaction scheme achieves trusted verification and fair bargaining while ensuring privacy protection in a decentralized environment.The experimental results show that the model improves the credibility and fairness of medical data transactions,maximizes social benefits,encourages more patients and medical institutions to participate in the circulation of medical data,and more fully taps the potential value of medical data. 展开更多
关键词 Blockchain data transactions zero-knowledge proof game pricing
在线阅读 下载PDF
A Blockchain-Based Proxy Re-Encryption Scheme with Conditional Privacy Protection and Auditability
16
作者 Chen Guo PengWeijun +3 位作者 Wu Jing Fang Youxuan Ye Keke Xin Yanshuang 《China Communications》 SCIE CSCD 2024年第7期267-277,共11页
With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosur... With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosure,tenant privacy disclosure and rental contract disputes frequently occur,and the security,fairness and auditability of the housing leasing transaction cannot be guaranteed.To solve the above problems,a blockchain-based proxy re-encryption scheme with conditional privacy protection and auditability is proposed.The scheme implements fine-grained access control of door lock data based on attribute encryption technology with policy hiding,and uses proxy re-encryption technology to achieve auditable supervision of door lock information transactions.Homomorphic encryption technology and zero-knowledge proof technology are introduced to ensure the confidentiality of housing rent information and the fairness of rent payment.To construct a decentralized housing lease transaction architecture,the scheme realizes the efficient collaboration between the door lock data ciphertext stored under the chain and the key information ciphertext on the chain based on the blockchain and InterPlanetary File System.Finally,the security proof and computing performance analysis of the proposed scheme are carried out.The results show that the scheme can resist the chosen plaintext attack and has low computational cost. 展开更多
关键词 attribute encryption blockchain homomorphic encryption house leasing proxy re-encryption zero-knowledge proof
在线阅读 下载PDF
A Cloud-Fog Enabled and Privacy-Preserving IoT Data Market Platform Based on Blockchain
17
作者 Yurong Luo Wei You +3 位作者 Chao Shang Xiongpeng Ren Jin Cao Hui Li 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期2237-2260,共24页
The dynamic landscape of the Internet of Things(IoT)is set to revolutionize the pace of interaction among entities,ushering in a proliferation of applications characterized by heightened quality and diversity.Among th... The dynamic landscape of the Internet of Things(IoT)is set to revolutionize the pace of interaction among entities,ushering in a proliferation of applications characterized by heightened quality and diversity.Among the pivotal applications within the realm of IoT,as a significant example,the Smart Grid(SG)evolves into intricate networks of energy deployment marked by data integration.This evolution concurrently entails data interchange with other IoT entities.However,there are also several challenges including data-sharing overheads and the intricate establishment of trusted centers in the IoT ecosystem.In this paper,we introduce a hierarchical secure data-sharing platform empowered by cloud-fog integration.Furthermore,we propose a novel non-interactive zero-knowledge proof-based group authentication and key agreement protocol that supports one-to-many sharing sets of IoT data,especially SG data.The security formal verification tool shows that the proposed scheme can achieve mutual authentication and secure data sharing while protecting the privacy of data providers.Compared with previous IoT data sharing schemes,the proposed scheme has advantages in both computational and transmission efficiency,and has more superiority with the increasing volume of shared data or increasing number of participants. 展开更多
关键词 IoT data sharing zero-knowledge proof authentication privacy preserving blockchain
在线阅读 下载PDF
A Systematic Literature Review on Blockchain Consensus Mechanisms’ Security: Applications and Open Challenges
18
作者 Muhammad Muntasir Yakubu Mohd Fadzil B Hassan +5 位作者 Kamaluddeen Usman Danyaro Aisha Zahid Junejo Muhammed Siraj Saidu Yahaya Shamsuddeen Adamu Kamal Abdulsalam 《Computer Systems Science & Engineering》 2024年第6期1437-1481,共45页
This study conducts a systematic literature review(SLR)of blockchain consensus mechanisms,an essential protocols that maintain the integrity,reliability,and decentralization of distributed ledger networks.The aim is t... This study conducts a systematic literature review(SLR)of blockchain consensus mechanisms,an essential protocols that maintain the integrity,reliability,and decentralization of distributed ledger networks.The aim is to comprehensively investigate prominent mechanisms’security features and vulnerabilities,emphasizing their security considerations,applications,challenges,and future directions.The existing literature offers valuable insights into various consensus mechanisms’strengths,limitations,and security vulnerabilities and their real-world applications.However,there remains a gap in synthesizing and analyzing this knowledge systematically.Addressing this gap would facilitate a structured approach to understanding consensus mechanisms’security and vulnerabilities comprehensively.The study adheres to Preferred Reporting Items for Systematic Reviews and Meta-Analyses(PRISMA)guidelines and computer science standards and reviewed 3749 research papers from 2016 to 2024,excluding grey literature,resulting in 290 articles for descriptive analysis.The research highlights an increased focus on blockchain consensus security,energy efficiency,and hybrid mechanisms within 60%of research papers post-2019,identifying gaps in scalability,privacy,and interoperability for future exploration.By synthesizing the existing research and identifying the key trends,this SLR contributes to advancing the understanding of blockchain consensus mechanisms’security and guiding future research and structured innovation in blockchain systems and applications. 展开更多
关键词 Blockchain consensus mechanisms supply chain management proof of work(PoW) proof of stake(PoS) practical byzantine fault tolerance(PBFT)
在线阅读 下载PDF
Correction to:An Efficient Randomized Fixed-Precision Algorithm for Tensor Singular Value Decomposition
19
作者 Salman Ahmadi-Asl 《Communications on Applied Mathematics and Computation》 2024年第4期2332-2335,共4页
Correction to:Communications on Applied Mathematics and Computation(2023)5:1564-1583 https://doi.0rg/10.1007/s42967-022-00218-w Regretfully,due to technical issues encountered during the proofreading process,certain p... Correction to:Communications on Applied Mathematics and Computation(2023)5:1564-1583 https://doi.0rg/10.1007/s42967-022-00218-w Regretfully,due to technical issues encountered during the proofreading process,certain portions of our published paper[1]include some inconsistencies.To dispel any confusion for the readers,we decided to address these technical problems.The corrected version was uploaded on arXiv https://arxiv.org/abs/2207.08307 and the codes are accessible at https://github.com/SalmanAhmadi-Asl/Fixed-Precision-t-SVD.Here are the corrections. 展开更多
关键词 PROBLEMS Fixed PROOF
在线阅读 下载PDF
Time Dilation Cosmology 3: Mathematical Proof of the 3 Temporal and 2 Spatial Acceleration Factors
20
作者 Joseph H. (Cass) Forrington 《Journal of Modern Physics》 2024年第12期2228-2237,共10页
This is the fifth paper in a series on Time Dilation Cosmology, TDC. TDC is an eternal holographic model of the universe based on time dilation that ties astrophysics to quantum physics and resolves all the conundrums... This is the fifth paper in a series on Time Dilation Cosmology, TDC. TDC is an eternal holographic model of the universe based on time dilation that ties astrophysics to quantum physics and resolves all the conundrums in astrophysics and serves as a model for the unified field. In the author’s previous four TDC papers, it was demonstrated that all gravitationally induced velocities are compensation for the apparent difference in the rates of time, “dRt”, due to mass/energy densities, and, vice-versa, in all force-induced velocities the dRt is compensation for the velocity, so the uniform evolution of the continuum at c is maintained at the invariant 1 s/s rate of time of the universe as a whole. These compensations make it impossible for an event to lag behind or get ahead of the evolving continuum. When the author did the first velocity formula derivations in “General Relativity: Effects in Time as Causation” [1], the author felt the explanations for the appearance of the 2spatial and the 3temporal acceleration factors in the formulas were correct, but poorly explained and incomplete. This paper is a proof of the temporal and spatial acceleration factors used in the time dilation-based velocity formula derivations in the Time Dilation Cosmology model. 展开更多
关键词 Mathematical Proof Time Dilation Cosmology Acceleration Factors
在线阅读 下载PDF
上一页 1 2 39 下一页 到第
使用帮助 返回顶部