Results 61 to 70 of about 388,006 (269)
Blockchain in Communication Networks: A Comprehensive Review
This article provides a comprehensive review of blockchain applications in communication networks, focusing on domains such as IoT, 5G, vehicular systems, and decentralised trust infrastructures. It examines key challenges—including scalability, interoperability, and latency—and outlines future directions such as lightweight consensus protocols and AI ...
Quazi Mamun, Zhenni Pan, Jun Wu
wiley +1 more source
FPGA Realization of a Novel Hyperchaos Augmented Image Encryption Algorithm
With the rapid growth of multimedia communication, protecting image data has become increasingly critical. This article proposes a novel 3‐stage hyperchaos‐based augmented image encryption technique (3SHAIET) that utilizes a three‐stage process with chaotic systems of increasing dimensionality (e.g., six‐dimensional [6D], 8D, and 9D) to enhance ...
Wassim Alexan +6 more
wiley +1 more source
Memristive crypto primitive for building highly secure physical unclonable functions
Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physical systems to generate secret information. The advantage is that PUFs have the potential to provide fundamentally higher security than traditional ...
Yansong Gao +4 more
semanticscholar +1 more source
Protocols for Quantum Weak Coin Flipping [PDF]
Weak coin flipping is an important cryptographic primitive$\unicode{x2013}$it is the strongest known secure two-party computation primitive that classically becomes secure only under certain assumptions (e.g.
Atul Singh Arora +3 more
doaj +1 more source
Energy-efficient cryptographic primitives
Our society greatly depends on services and applications provided by mobile communication networks. As billions of people and devices become connected, it becomes increasingly important to guarantee security of interactions of all players. In this talk we address several aspects of this important, many-folded problem.
openaire +2 more sources
Recent proposals by Mahmood et al., Braeken et al., and Chaudhry et al. aimed at establishing secure communication in AMI, asserting their methods fulfil the requisite security criteria. This paper, however, reveals that each of these proposals exhibits security vulnerabilities and lacks sufficient features for deployment.
Ahmad Rahdari, Bahareh Akhbari
wiley +1 more source
CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives [PDF]
Joel Kuepper +11 more
openalex +1 more source
This paper proposes a novel image steganographic method based on an enhanced Pyramid Integer Wavelet Transform (PIWT) combined with a Modified Optimal Pixel Adjustment Process (MOPAP). The PIWT enables integer‐to‐integer transformation, avoiding floating‐point computations and improving its suitability for efficient implementation.
Ali Yahya Al‐Ashwal +2 more
wiley +1 more source
A Novel Identity-Based Signcryption Scheme in the Standard Model
Identity-based signcryption is a useful cryptographic primitive that provides both authentication and confidentiality for identity-based crypto systems. It is challenging to build a secure identity-based signcryption scheme that can be proven secure in a
Yueying Huang, Junjie Yang
doaj +1 more source
Anomaly detection in distributed environments poses significant challenges, particularly in balancing privacy, communication overhead, and detection accuracy. This paper presents FedAnomDetect, a novel federated learning (FL‐based framework designed for anomaly detection across large‐scale, distributed systems.
Abeer Abdullah Alsadhan, Peican Zhu
wiley +1 more source

