Analysing the effect of digital technology on carbon emissions is crucial for China to achieve carbon neutrality. This exploration utilises the bootstrap full-and sub-sample techniques to …
O Ben-Shahar - Journal of Legal Analysis, 2023 - academic.oup.com
Regulatory and sociological resistance to new market-driven technologies, particularly to those that rely on collection and analysis of personal data, is prevalent even in cases where …
K Hameed, R Naha, F Hameed - Discover Sustainability, 2024 - Springer
Ensuring good health and well-being is one of the crucial Sustainable Development Goals (SDGs) that aims to promote healthy lives and well-being for people of all ages. This …
B Sriman, S Ganesh Kumar - Multimedia Tools and Applications, 2024 - Springer
This paper investigated the Bitcoin blockchain and other crypto currencies confidential transaction techniques for cryptographic commitment in a zero-knowledge proof system. A …
S Linsner, K Demuth, M Fischlin… - Proceedings on Privacy …, 2024 - petsymposium.org
In many scenarios, users have to communicate sensitive data with third parties such as doctors, lawyers, insurance companies, social workers, or online shops. Handing over …
Blockchain technology has the potential to revolutionize the insurance industry by bringing unprecedented levels of transparency, security and autonomous continuity. By leveraging …
W El-Samad, M Atieh, M Adda - Procedia Computer Science, 2023 - Elsevier
Over the past decade, the blockchain technology has gained a significant traction with the introduction of the “bitcoin”, the first cryptocurrency back in 2008. The rapid growth of …
O Kuznetsov, A Rusnak, A Yezhov, D Kanonik… - Cryptography, 2024 - mdpi.com
Zero-knowledge proofs have emerged as a powerful tool for enhancing privacy and security in blockchain applications. However, the efficiency and scalability of proof systems remain a …
A Mehmood, MA Khan, C Maple… - 2023 10th International …, 2023 - ieeexplore.ieee.org
The growing deployment of Industrial Internet of Things (IIoTs) raises significant authentication concerns, especially in scenarios where resource-constrained devices need …