Results 61 to 70 of about 388,006 (269)

Blockchain in Communication Networks: A Comprehensive Review

open access: yesIET Blockchain, Volume 6, Issue 1, January/December 2026.
This article provides a comprehensive review of blockchain applications in communication networks, focusing on domains such as IoT, 5G, vehicular systems, and decentralised trust infrastructures. It examines key challenges—including scalability, interoperability, and latency—and outlines future directions such as lightweight consensus protocols and AI ...
Quazi Mamun, Zhenni Pan, Jun Wu
wiley   +1 more source

FPGA Realization of a Novel Hyperchaos Augmented Image Encryption Algorithm

open access: yesIET Computers &Digital Techniques, Volume 2026, Issue 1, 2026.
With the rapid growth of multimedia communication, protecting image data has become increasingly critical. This article proposes a novel 3‐stage hyperchaos‐based augmented image encryption technique (3SHAIET) that utilizes a three‐stage process with chaotic systems of increasing dimensionality (e.g., six‐dimensional [6D], 8D, and 9D) to enhance ...
Wassim Alexan   +6 more
wiley   +1 more source

Memristive crypto primitive for building highly secure physical unclonable functions

open access: yesScientific Reports, 2015
Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physical systems to generate secret information. The advantage is that PUFs have the potential to provide fundamentally higher security than traditional ...
Yansong Gao   +4 more
semanticscholar   +1 more source

Protocols for Quantum Weak Coin Flipping [PDF]

open access: yesTheoretiCS
Weak coin flipping is an important cryptographic primitive$\unicode{x2013}$it is the strongest known secure two-party computation primitive that classically becomes secure only under certain assumptions (e.g.
Atul Singh Arora   +3 more
doaj   +1 more source

Energy-efficient cryptographic primitives

open access: yesFacta universitatis - series: Electronics and Energetics, 2018
Our society greatly depends on services and applications provided by mobile communication networks. As billions of people and devices become connected, it becomes increasingly important to guarantee security of interactions of all players. In this talk we address several aspects of this important, many-folded problem.
openaire   +2 more sources

SKE2SG: A Secure Key Establishment Scheme for Smart Grid Cyber‐Physical Systems Based on Elliptic Curve Cryptography

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 11, Issue 1, January/December 2026.
Recent proposals by Mahmood et al., Braeken et al., and Chaudhry et al. aimed at establishing secure communication in AMI, asserting their methods fulfil the requisite security criteria. This paper, however, reveals that each of these proposals exhibits security vulnerabilities and lacks sufficient features for deployment.
Ahmad Rahdari, Bahareh Akhbari
wiley   +1 more source

CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives [PDF]

open access: diamond, 2023
Joel Kuepper   +11 more
openalex   +1 more source

A Novel Image Steganographic Method Based on Enhanced PIWT and Modified Optimal Pixel Adjustment Process

open access: yesIET Image Processing, Volume 20, Issue 1, January/December 2026.
This paper proposes a novel image steganographic method based on an enhanced Pyramid Integer Wavelet Transform (PIWT) combined with a Modified Optimal Pixel Adjustment Process (MOPAP). The PIWT enables integer‐to‐integer transformation, avoiding floating‐point computations and improving its suitability for efficient implementation.
Ali Yahya Al‐Ashwal   +2 more
wiley   +1 more source

A Novel Identity-Based Signcryption Scheme in the Standard Model

open access: yesInformation, 2017
Identity-based signcryption is a useful cryptographic primitive that provides both authentication and confidentiality for identity-based crypto systems. It is challenging to build a secure identity-based signcryption scheme that can be proven secure in a
Yueying Huang, Junjie Yang
doaj   +1 more source

FedAnomDetect a Clustered Federated Learning Framework for Robust Anomaly Detection With Enhanced Privacy and Communication Efficiency

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Anomaly detection in distributed environments poses significant challenges, particularly in balancing privacy, communication overhead, and detection accuracy. This paper presents FedAnomDetect, a novel federated learning (FL‐based framework designed for anomaly detection across large‐scale, distributed systems.
Abeer Abdullah Alsadhan, Peican Zhu
wiley   +1 more source

Home - About - Disclaimer - Privacy