Results 61 to 70 of about 7,441 (248)
Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols [PDF]
Anum Sajjad +5 more
openalex +1 more source
Accreditation Against Limited Adversarial Noise
An upgraded accreditation (a variant of quantum verification) scheme is presented, significantly relaxing the assumptions, to allow adversarial noise, while preserving the suitability for near‐term / immediate usage. Abstract An accreditation protocol (a variety of quantum verification) is presented, where error is assumed to be adversarial (in ...
Andrew Jackson
wiley +1 more source
Authentication and common key generation cryptographic protocol for vehicle tachographs
We present a public key generation protocol. The key is used for subscriber authentication in tachographs installed on vehicles in order to provide traffic safety. The protocol is based on the well-known Russian cryptographic algorithms.
Victor S. Gorbatov +2 more
doaj +1 more source
Digital Twin Simulations Toolbox of the Nitrogen‐Vacancy Center in Diamond
The Nitrogen‐vacancy (NV) center in diamond is a key platform within quantum technologies. This work introduces a Python based digital‐twin of the NV, where the spin dynamics of the system is simulated without relying on commonly used approximations, such as the adoption of rotating frame. The digital‐twin is validated through three different examples,
Lucas Tsunaki +3 more
wiley +1 more source
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source
ABSTRACT Global municipal solid waste generation is projected to exceed 3.8 billion tonnes annually by 2050. This makes the need for smart, inclusive, and scalable waste valorization systems more urgent than ever. This review critically explores the shift from conventional waste management to intelligent, technology‐driven solutions aligned with ...
Segun E. Ibitoye +8 more
wiley +1 more source
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha +9 more
wiley +1 more source
Ridra: A Rigorous Decentralized Randomized Authentication in VANETs
Ensuring the security and privacy of vehicle is one of the critical requirements for the safety and reliability of vehicular ad hoc networks. A variety of (conditional) anonymous authentication schemes, including group/ring signatures, pseudo-identity ...
Cong Sun +4 more
doaj +1 more source
Abstracting cryptographic protocols with tree automata [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +1 more source
A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis +7 more
wiley +1 more source

