Results 141 to 150 of about 1,901,421 (313)

M‐SADR: Mobile Self Adaptive Data Rate for Enhanced LoRa End‐Device Connectivity on the Move

open access: yesInternational Journal of Communication Systems, Volume 38, Issue 15, October 2025.
The proposed M‐SADR method targets mobile LoRa end‐devices and achieves better performance, with a 2.4% improvement in packet delivery ratio and a 5.7% reduction in power consumption per successfully delivered packet. ABSTRACT Mobility is a critical aspect of the Internet of Things, reflecting the diverse and dynamic nature of potential applications ...
Vasileios Moysiadis   +6 more
wiley   +1 more source

Enhancing the SRAM PUF with an XOR Gate

open access: yesApplied Sciences
This study focuses on designing enhanced Physically Unclonable Functions (PUFs) based on SRAM devices and improving the security of cryptographic systems.
Jack Garrard   +2 more
doaj   +1 more source

Delphi: A Cryptographic Inference Service for Neural Networks

open access: yesIACR Cryptology ePrint Archive, 2020
Pratyush Mishra   +4 more
semanticscholar   +1 more source

Hardware Design for Secure Telemedicine Using A Novel Framework, A New 4D Memristive Chaotic Oscillator, and Dispatched Gray Code Scrambler

open access: yesEngineering Reports, Volume 7, Issue 10, October 2025.
This work presents a secure telemedicine cryptosystem based on a novel 4D memristive chaotic oscillator and a Dispatched Gray Code Scrambler (DGCS). Implemented on FPGA, the system ensures power‐efficient encryption, making it suitable for real‐time medical image transmission in IoT healthcare environments.
Fritz Nguemo Kemdoum   +3 more
wiley   +1 more source

vulnerability Analysis Techniques of Hardware and Software Implementations of Cryptographic Algorithms

open access: yesБезопасность информационных технологий, 2014
The article is a brief survey of hardware vulnerability analysis methods that might be applicable against cryptographic algorithm implementations. Those methods are based on physical properties of a device processing the algorithm.
Roman Gevorkovich Korkikian   +2 more
doaj  

Open and Closed Loop Approaches for Energy Efficient Quantum Optimal Control

open access: yesAdvanced Quantum Technologies, Volume 8, Issue 10, October 2025.
Concepts from quantum thermodynamics and optimal control are blended to derive a theoretical framework to quantify and minimize the energetic cost of a pulse for unitary synthesis. Two complementary techniques (based on GRAPE and Reinforce‐DRL) are implemented as open‐source software that co‐optimizes the fidelity and energetic cost within quantum ...
Sebastiaan Fauquenot   +2 more
wiley   +1 more source

Divertible protocols and atomic proxy cryptography

open access: bronze, 1998
Matt Blaze   +2 more
openalex   +1 more source

Market Reactions to Cryptocurrency Regulation: Risk, Return and the Role of Enforcement Quality

open access: yesBritish Journal of Management, Volume 36, Issue 4, Page 1709-1745, October 2025.
Abstract We explore the risk–return trade‐off in international regulation of cryptocurrency markets using a unique sample of regulations implemented between July 2018 and April 2023. Various regulation types have reduced risk in cryptocurrency markets while having differential impacts on raw and risk‐adjusted returns.
Douglas Cumming   +2 more
wiley   +1 more source

Efficient anonymous authentication protocol for internet of vehicles based on Chinese cryptographic SM2

open access: yes网络与信息安全学报
A critical component of cybersecurity protection in the internet of vehicles (IoV) was identity authentication. However, many existing authentication schemes were plagued by low efficiency and incompatibility with domestic cryptographic algorithms.
SU Binting, FANG He, XU Li
doaj  

Home - About - Disclaimer - Privacy