Results 91 to 100 of about 5,022 (206)

Efficient Robust Spontaneous Parametric Down‐Conversion via Detuning Modulated Composite Segments Designs

open access: yesLaser &Photonics Reviews, Volume 20, Issue 5, 6 March 2026.
Detuning modulated composite segmentation (DMCS) enables robust spontaneous parametric down‐conversion with sevenfold improved temperature stability compared to conventional designs, opening new possibilities for stable quantum photon sources. ABSTRACT Spontaneous parametric down conversion (SPDC) holds a pivotal role in quantum physics, facilitating ...
Muhammad Erew   +5 more
wiley   +1 more source

Exploring Imprecise Probabilities in Quantum Algorithms with Possibility Theory

open access: yesProceedings in Applied Mathematics and Mechanics, Volume 26, Issue 1, March 2026.
ABSTRACT Quantum computing utilizes the underlying principles of quantum mechanics to perform computations with unmatched performance capabilities. Rather than using classical bits, it operates on qubits, which can exist in superposition and entangled states. This enables the solution of problems that are considered intractable for classical computers.
Jan Schneider   +2 more
wiley   +1 more source

A Review of Lightweight IoT Authentication Protocols From the Perspective of Security Requirements, Computation, Communication, and Hardware Costs

open access: yesIEEE Access
The Internet of Things (IoT) is a broad area that encompasses various use cases. Numerous use cases include various IoT devices, which necessitate various cryptographic methods to provide distinct security requirements.
Isil Cetintav, Mehmet Tahir Sandikkaya
doaj   +1 more source

Digital Twin Simulations Toolbox of the Nitrogen‐Vacancy Center in Diamond

open access: yesAdvanced Quantum Technologies, Volume 9, Issue 3, March 2026.
The Nitrogen‐vacancy (NV) center in diamond is a key platform within quantum technologies. This work introduces a Python based digital‐twin of the NV, where the spin dynamics of the system is simulated without relying on commonly used approximations, such as the adoption of rotating frame. The digital‐twin is validated through three different examples,
Lucas Tsunaki   +3 more
wiley   +1 more source

Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms

open access: yesScientific Reports
This research introduces a novel hybrid cryptographic framework that combines traditional cryptographic protocols with advanced methodologies, specifically Wasserstein Generative Adversarial Networks with Gradient Penalty (WGAN-GP) and Genetic Algorithms
Purushottam Singh   +2 more
doaj   +1 more source

Smart Waste, Smarter World: Exploring Waste Types, Trends, and Tech‐Driven Valorization Through Artificial Intelligence, Internet of Things, and Blockchain

open access: yesSustainable Development, Volume 34, Issue S2, Page 132-153, March 2026.
ABSTRACT Global municipal solid waste generation is projected to exceed 3.8 billion tonnes annually by 2050. This makes the need for smart, inclusive, and scalable waste valorization systems more urgent than ever. This review critically explores the shift from conventional waste management to intelligent, technology‐driven solutions aligned with ...
Segun E. Ibitoye   +8 more
wiley   +1 more source

A Hybrid Encryption Framework for Secure and Real‐Time Vehicular Communications

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 2, March/April 2026.
ABSTRACT The rapid expansion of Vehicular Ad Hoc Networks (VANETs) has amplified concerns regarding data security, integrity, and privacy. This paper presents SECURIDE, a Secure Intelligent Data Exchange for Connected Vehicles that provides a comprehensive encryption–decryption framework for safeguarding multimedia data and communication channels in ...
Muhammad Usama, Muhammad Usman Hadi
wiley   +1 more source

vulnerability Analysis Techniques of Hardware and Software Implementations of Cryptographic Algorithms

open access: yesБезопасность информационных технологий, 2014
The article is a brief survey of hardware vulnerability analysis methods that might be applicable against cryptographic algorithm implementations. Those methods are based on physical properties of a device processing the algorithm.
Roman Gevorkovich Korkikian   +2 more
doaj  

Federated Learning and 5G/6G‐Based Internet of Medical Things (IoMT): Applications, Key Enabling Technologies, Open Issues and Future Research Directions

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 1, March 2026.
This review examines the integration of federated learning (FL) in the Internet of Medical Things (IoMT), enhanced by 5G/6G technologies, to improve healthcare systems with decentralized data processing, enhanced privacy, reduced latency, and efficient resource utilization, while addressing emerging challenges and future research directions.
Abdul Ahad   +6 more
wiley   +1 more source

Constructing formal models of cryptographic protocols from Alice&Bob style specifications via LLM

open access: yesScientific Reports
Automated formal analysis is a fundamental method for ensuring the security of cryptographic protocol design. This approach entails two stages: formal modeling and formal analysis.
Qiang Li   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy