Results 81 to 90 of about 6,594 (201)
QuantumNetSec: Quantum Machine Learning for Network Security
ABSTRACT As the digital landscape becomes increasingly complex, traditional cybersecurity measures are struggling to keep pace with the growing sophistication of cyber threats. This escalating challenge calls for new, more robust solutions. In this context, quantum computing emerges as a powerful tool that can change our approach to network security ...
Diego Abreu+3 more
wiley +1 more source
Federated Learning Architectures: A Performance Evaluation With Crop Yield Prediction Application
ABSTRACT Introduction Federated learning has become an emerging technology in data analysis for IoT applications. Methods This paper implements centralized and decentralized federated learning frameworks for crop yield prediction based on Long Short‐Term Memory Network and Gated Recurrent Unit.
Anwesha Mukherjee, Rajkumar Buyya
wiley +1 more source
Security and Composition of Multiparty Cryptographic Protocols [PDF]
Ran Canetti
openalex +1 more source
ABSTRACT Australia is a maritime nation, relying on access to its surrounding oceans for its economy and security. The Royal Australian Navy conducts undersea surveillance to monitor this vital maritime environment and gain insight into activities beneath the ocean's surface.
Timothy J. Milledge+2 more
wiley +1 more source
ABSTRACT Blockchain (BC) technology is widely believed to be the next disruptive technology that can address challenges in higher education institutions (HEIs) and support resilient strategies. This study aims to contribute to the literature and inform policymakers about BC's capability and potential in HE by examining enablers, barriers and contextual
Buddhi Pathak+2 more
wiley +1 more source
ABSTRACT Blockchain (BC) systems are increasingly used by consortia to monitor ex‐post opportunism in food supply chains. BC systems differ for BC technical characteristics, complementary technologies, and organizational tools. Yet, little is empirically known about the link between different BC system designs and the context where they are implemented
Pamela Danese, Pietro Romano
wiley +1 more source
Enhancing the SRAM PUF with an XOR Gate
This study focuses on designing enhanced Physically Unclonable Functions (PUFs) based on SRAM devices and improving the security of cryptographic systems.
Jack Garrard+2 more
doaj +1 more source
Entangled State Quantum Cryptography: Eavesdropping on the Ekert Protocol [PDF]
Devang Naik+4 more
openalex +1 more source
A Simple and Efficient Approach to Verifying Cryptographic Protocols [PDF]
Yongxing Sun, Xinmei Wang
openalex +1 more source
Cyanothiazoles, paired with copper(I) iodide, form complexes with luminescent properties. X‐ray crystallography revealed two types of coordination polymers, while spectroscopic, synchrotron, and electric measurements supported by density functional (DFT) calculations studies highlighted their unique electronic features, offering a foundation for future
Karolina Gutmańska+12 more
wiley +1 more source