Results 61 to 70 of about 7,441 (248)

Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols [PDF]

open access: gold, 2020
Anum Sajjad   +5 more
openalex   +1 more source

Accreditation Against Limited Adversarial Noise

open access: yesAdvanced Quantum Technologies, EarlyView.
An upgraded accreditation (a variant of quantum verification) scheme is presented, significantly relaxing the assumptions, to allow adversarial noise, while preserving the suitability for near‐term / immediate usage. Abstract An accreditation protocol (a variety of quantum verification) is presented, where error is assumed to be adversarial (in ...
Andrew Jackson
wiley   +1 more source

Authentication and common key generation cryptographic protocol for vehicle tachographs

open access: yesБезопасность информационных технологий, 2017
We present a public key generation protocol. The key is used for subscriber authentication in tachographs installed on vehicles in order to provide traffic safety. The protocol is based on the well-known Russian cryptographic algorithms.
Victor S. Gorbatov   +2 more
doaj   +1 more source

Digital Twin Simulations Toolbox of the Nitrogen‐Vacancy Center in Diamond

open access: yesAdvanced Quantum Technologies, EarlyView.
The Nitrogen‐vacancy (NV) center in diamond is a key platform within quantum technologies. This work introduces a Python based digital‐twin of the NV, where the spin dynamics of the system is simulated without relying on commonly used approximations, such as the adoption of rotating frame. The digital‐twin is validated through three different examples,
Lucas Tsunaki   +3 more
wiley   +1 more source

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Smart Waste, Smarter World: Exploring Waste Types, Trends, and Tech‐Driven Valorization Through Artificial Intelligence, Internet of Things, and Blockchain

open access: yesSustainable Development, EarlyView.
ABSTRACT Global municipal solid waste generation is projected to exceed 3.8 billion tonnes annually by 2050. This makes the need for smart, inclusive, and scalable waste valorization systems more urgent than ever. This review critically explores the shift from conventional waste management to intelligent, technology‐driven solutions aligned with ...
Segun E. Ibitoye   +8 more
wiley   +1 more source

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Ridra: A Rigorous Decentralized Randomized Authentication in VANETs

open access: yesIEEE Access, 2018
Ensuring the security and privacy of vehicle is one of the critical requirements for the safety and reliability of vehicular ad hoc networks. A variety of (conditional) anonymous authentication schemes, including group/ring signatures, pseudo-identity ...
Cong Sun   +4 more
doaj   +1 more source

Abstracting cryptographic protocols with tree automata [PDF]

open access: yesScience of Computer Programming, 1999
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +1 more source

A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy