-
21
CYBER-PHENOMENOLOGY'S VERSION OF NFT MARKETING STRATEGY
Published 2024-12-01Subjects: Get full text
Article -
22
Analysis of Buying, Selling, and Leasing Virtual Land in the Metaverse: A Perspective from Sharia Economic Law
Published 2024-05-01Subjects: “…buying and selling, leasing, virtual land, crypto and metaverse…”
Get full text
Article -
23
Monetary Reform and Central Bank Digital Currencies: The Impact on Retail Banking
Published 2024-02-01Subjects: Get full text
Article -
24
Possibilities in Blockchain technology application
Published 2023-01-01Subjects: Get full text
Article -
25
A Low-Cost PKC-Based RFID Mutual Authentication Protocol
Published 2013-10-01Subjects: Get full text
Article -
26
Metaverse crimes in virtual (Un)reality: Fraud and sexual offences under English law
Published 2025-03-01Subjects: Get full text
Article -
27
A Secure Application for Information Sharing i n Organizations: A Case Study of Kabale District Local Government
Published 2019Subjects: “…A secure Application; Information Sharing; organizations; Crypto-graphical Methods…”
Get full text
Article -
28
Saber With Hybrid Striding Toom Cook-Based Multiplier: Implementation Using Open-Source Tool Flow and Industry Standard Chip Design Tools
Published 2025-01-01Subjects: Get full text
Article -
29
Key security detection based on dynamic binary instrumentation
Published 2017-11-01Subjects: Get full text
Article -
30
Regulating DeFi: Safeguarding Market Integrity While Managing High Expectations
Published 2024-12-01Subjects: Get full text
Article -
31
Kripto Varlıkların Denetimi: Blok Zincir Teknolojisinin Bağımsız Denetim Sürecine Etkisi
Published 2022-09-01Subjects: Get full text
Article -
32
Taş Baskıdan NFT’ye: Teknolojinin Olanakları ile Dönüşen Sanat Anlayışı ve NFT Teknolojisi Üzerine bir Araştırma
Published 2022-12-01Subjects: Get full text
Article -
33
KRİPTO PARA FİYATLARININ LSTM VE GRU MODELLERİ İLE TAHMİNİ
Published 2023-03-01Subjects: “…crypto-currency…”
Get full text
Article -
34
Decentralised Finance (DeFi) — How Tokenisation is Changing the Financial Industry
Published 2021-08-01“…An important driver for this development is the ongoing tokenisation of assets, payments and rights, which enables the digital encryption of “crypto assets” on distributed ledgers. This article elaborates the foundations and fields of application of decentralised financial services with crypto assets that could challenge the established business models of financial institutions. …”
Get full text
Article -
35
Motivations of Retailers Accepting Cryptocurrency Payments and Their Implications on Retail Customer Experience
Published 2022-01-01“…However, it has been found that there are also consumers who are totally unaware of the existence of payments with crypto currencies. Some consumers do not prefer payments with crypto currencies either because of low technology usage level or lack of trust to the system. …”
Get full text
Article -
36
ESP32 and MAX30100 with Chebyshev Filter for Enhanced Heart and Oxygen Measurement
Published 2024-10-01Get full text
Article -
37
On novel security systems based on the 2-cyclic refined integers and the foundations of 2-cyclic refined number theory
Published 2024-03-01“…Integers play a basic role in the structures of asymmetric crypto-algorithms. Many famous public key crypto-schemes use the basics of number theory to share keys and decrypt and encrypt messages and multimedia. …”
Get full text
Article -
38
THE PHENOMENON OF CRYPTOCURRENCY FROM DIVERSE PERSPECTIVES
Published 2019-12-01“…The growth of crypto industry develops vigorous, especially in recent years, moving from a universally controlled electronic cash system society to complete financial freedom. …”
Get full text
Article -
39
Enterprise internal audit data encryption based on blockchain technology.
Published 2025-01-01“…Utilizing homomorphic Paillier encryption, BlockCryptoAudit ensures that computations may be performed on encrypted audit data while safeguarding data privacy. …”
Get full text
Article -
40
Computationally sound mechanized proofs for Diffie-Hellman key exchange protocols
Published 2011-01-01“…A computationally observational equivalence model for the Diffe-Hellman key agreement primitive was pro-posed and the soundness of the model was proved.Compared with prior works,this model can extend the power of the mechanized prover CryptoVerif directly.When applying the model to proving the public-key Kerberos,the deficiency of the adversary’s capability was uncovered and an enhanced model for the adversary was presented.The model was vali-dated by verifying the public-key Kerberos in Diffie-Hellman mode with CryptoVerif automatically.Being different from current approaches,the verification procedure is both automatic and computationally sound.…”
Get full text
Article