Results 141 to 150 of about 1,901,421 (313)
M‐SADR: Mobile Self Adaptive Data Rate for Enhanced LoRa End‐Device Connectivity on the Move
The proposed M‐SADR method targets mobile LoRa end‐devices and achieves better performance, with a 2.4% improvement in packet delivery ratio and a 5.7% reduction in power consumption per successfully delivered packet. ABSTRACT Mobility is a critical aspect of the Internet of Things, reflecting the diverse and dynamic nature of potential applications ...
Vasileios Moysiadis +6 more
wiley +1 more source
Enhancing the SRAM PUF with an XOR Gate
This study focuses on designing enhanced Physically Unclonable Functions (PUFs) based on SRAM devices and improving the security of cryptographic systems.
Jack Garrard +2 more
doaj +1 more source
Constraint solving for bounded-process cryptographic protocol analysis [PDF]
Jonathan K. Millen, Vitaly Shmatikov
openalex +1 more source
Delphi: A Cryptographic Inference Service for Neural Networks
Pratyush Mishra +4 more
semanticscholar +1 more source
This work presents a secure telemedicine cryptosystem based on a novel 4D memristive chaotic oscillator and a Dispatched Gray Code Scrambler (DGCS). Implemented on FPGA, the system ensures power‐efficient encryption, making it suitable for real‐time medical image transmission in IoT healthcare environments.
Fritz Nguemo Kemdoum +3 more
wiley +1 more source
The article is a brief survey of hardware vulnerability analysis methods that might be applicable against cryptographic algorithm implementations. Those methods are based on physical properties of a device processing the algorithm.
Roman Gevorkovich Korkikian +2 more
doaj
Open and Closed Loop Approaches for Energy Efficient Quantum Optimal Control
Concepts from quantum thermodynamics and optimal control are blended to derive a theoretical framework to quantify and minimize the energetic cost of a pulse for unitary synthesis. Two complementary techniques (based on GRAPE and Reinforce‐DRL) are implemented as open‐source software that co‐optimizes the fidelity and energetic cost within quantum ...
Sebastiaan Fauquenot +2 more
wiley +1 more source
Market Reactions to Cryptocurrency Regulation: Risk, Return and the Role of Enforcement Quality
Abstract We explore the risk–return trade‐off in international regulation of cryptocurrency markets using a unique sample of regulations implemented between July 2018 and April 2023. Various regulation types have reduced risk in cryptocurrency markets while having differential impacts on raw and risk‐adjusted returns.
Douglas Cumming +2 more
wiley +1 more source
A critical component of cybersecurity protection in the internet of vehicles (IoV) was identity authentication. However, many existing authentication schemes were plagued by low efficiency and incompatibility with domestic cryptographic algorithms.
SU Binting, FANG He, XU Li
doaj

