Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Shubham Sahai"'
Publikováno v:
The Journal of The British Blockchain Association (2021)
Financial Regulation is a form of compliance system that subjects financial institutions to certain requirements and restrictions. Investment Compliance is an example that involves investment restrictions and monitoring on behalf of investors. Hedge
Externí odkaz:
https://doaj.org/article/d18d354e3a0a4246959d63944910b763
Publikováno v:
International Journal of Analytical, Experimental and Finite Element Analysis (IJAEFEA). 8
This paper describes the different types of steering mechanisms and benchmarks a method for the selection of a steering system. It also explains the step-by-step method of designing a variable Ackerman steering geometry. The research uses the knowled
Publikováno v:
SN Applied Sciences. 3
This study explains a coherent flow for designing, manufacturing, analyzing, and testing a tunable anti-roll bar system for a formula student racecar. The design process starts with the analytical calculation for roll stiffness using constraining par
Publikováno v:
Blockchain
In general, applications use Trusted Third Party to authenticate users, application servers, and devices. Since Trusted Third Party based solutions are centralized, a decentralized scheme is preferred for applications, and blockchain is one of the be
Publikováno v:
Blockchain
Integrity and security of databases are maintained with access control policies and firewalls. However, insider attacks - where someone with administrative privileges tampers with the data - pose a unique challenge. In this paper, we propose Verity -
Publikováno v:
Blockchain
In recent years there have been increased efforts to make supply chains transparent and traceable to better protect the end consumer's interests against counterfeiting, contamination, false claims, and inadequate processes. The actors in the supply c
Publikováno v:
Computer Aided Verification ISBN: 9783030532871
CAV (1)
CAV (1)
Many important cryptographic primitives offer probabilistic guarantees of security that can be specified as quantitative hyperproperties; these are specifications that stipulate the existence of a certain number of traces in the system satisfying cer
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::293a4f6486951bea44f027c1b10f71e2
https://doi.org/10.1007/978-3-030-53288-8_11
https://doi.org/10.1007/978-3-030-53288-8_11
Integer factoring is a curious number theory problem with wide applications in complexity and cryptography. The best known algorithm to factor a number n takes time, roughly, exp(2*log^{1/3}(n)*log^{2/3}(log(n))) (number field sieve, 1989). One basic
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ba22d41d590b17512056c397b3fcf308