Results 101 to 110 of about 1,901,421 (313)

Entanglement in Quantum Systems Based on Directed Graphs

open access: yesAdvanced Quantum Technologies, EarlyView.
The entanglement properties of quantum states associated with directed graphs are investigated. It is proved that the vertex degree distribution fully determines this entanglement measure, which remains invariant under vertex relabeling, thereby highlighting its topological character.
Lucio De Simone, Roberto Franzosi
wiley   +1 more source

A Probabilistic Scheduler for the Analysis of Cryptographic Protocols

open access: yesElectronic Notes in Theoretical Computer Science, 2007
AbstractWhen modelling cryto-protocols by means of process calculi which express both nondeterministic and probabilistic behavior, it is customary to view the scheduler as an intruder. It has been established that the traditional scheduler needs to be carefully calibrated in order to more accurately reflect the intruder's capabilities for controlling ...
John Mullins   +2 more
openaire   +3 more sources

Smart Waste, Smarter World: Exploring Waste Types, Trends, and Tech‐Driven Valorization Through Artificial Intelligence, Internet of Things, and Blockchain

open access: yesSustainable Development, EarlyView.
ABSTRACT Global municipal solid waste generation is projected to exceed 3.8 billion tonnes annually by 2050. This makes the need for smart, inclusive, and scalable waste valorization systems more urgent than ever. This review critically explores the shift from conventional waste management to intelligent, technology‐driven solutions aligned with ...
Segun E. Ibitoye   +8 more
wiley   +1 more source

Ridra: A Rigorous Decentralized Randomized Authentication in VANETs

open access: yesIEEE Access, 2018
Ensuring the security and privacy of vehicle is one of the critical requirements for the safety and reliability of vehicular ad hoc networks. A variety of (conditional) anonymous authentication schemes, including group/ring signatures, pseudo-identity ...
Cong Sun   +4 more
doaj   +1 more source

Analysis of cyberspace security based on game theory

open access: yes网络与信息安全学报, 2015
Information security economics is an important research area and game theory is one of the main basic theories and tools of cyberspace security.Based on game theory,the main problems of cyberspace securing were analyzed which including network attack and
Jian-ming ZHU, Qin WANG
doaj   +3 more sources

An optimistic fair e-commerce protocol for large e-goods [PDF]

open access: yes, 2006
Suppose two entities that do not trust each other want to exchange some arbitrary data over a public channel. A fair exchange protocol ensures that both parties get what they want or neither gets anything.
Levi, Albert   +4 more
core  

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Security Analysis of Various Authentication Schemes Based on Three Types of Digital Signature Schemes

open access: yesIEEE Access, 2018
To achieve source authentication, message integrity, and non-repudiation, a number of authentication protocols adopt several types of digital signatures: public-key signatures, identity-based signatures, and certificateless signatures.
Kyung-Ah Shim
doaj   +1 more source

Cryptographic security of quantum key distribution [PDF]

open access: yes, 2014
This work is intended as an introduction to cryptographic security and a motivation for the widely used Quantum Key Distribution (QKD) security definition.
Portmann, Christopher, Renner, Renato
core  

The inductive approach to verifying cryptographic protocols [PDF]

open access: yesJournal of Computer Security, 1998
Informal arguments that cryptographic protocols are secure can be made rigorous using inductive definitions. The approach is based on ordinary predicate calculus and copes with infinite-state systems. Proofs are generated using Isabelle/HOL. The human effort required to analyze a protocol can be as little as a week or two, yielding a proof script that ...
openaire   +3 more sources

Home - About - Disclaimer - Privacy