Results 121 to 130 of about 63,614 (274)

M‐SADR: Mobile Self Adaptive Data Rate for Enhanced LoRa End‐Device Connectivity on the Move

open access: yesInternational Journal of Communication Systems, Volume 38, Issue 15, October 2025.
The proposed M‐SADR method targets mobile LoRa end‐devices and achieves better performance, with a 2.4% improvement in packet delivery ratio and a 5.7% reduction in power consumption per successfully delivered packet. ABSTRACT Mobility is a critical aspect of the Internet of Things, reflecting the diverse and dynamic nature of potential applications ...
Vasileios Moysiadis   +6 more
wiley   +1 more source

Knowledge Flow Analysis for Security Protocols

open access: yes, 2005
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of knowledge amongst principals. Because this characterization corresponds closely
Devadas, Srinivas   +4 more
core   +1 more source

A Comparative Analysis on the Services Offered by Amazon Web Services and Microsoft Azure

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 21-22, 25 September 2025.
ABSTRACT Different small or large‐scale enterprises came to the conclusion that moving data to the cloud is more convenient. In recent decades, AWS and Azure have tried their best to provide comparatively affordable and instant solutions. Both cloud platforms are extensive to understand, so it is difficult for users to make the right choice because of ...
Sara Hameed   +4 more
wiley   +1 more source

A Real-Time Performance Analysis Model for Cryptographic Protocols [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2012
Several encryption algorithms exist today for securing data in storage and transmission over network systems. The choice of encryption algorithms must weigh performance requirements against the call for protection of sensitive data.
Amos Olagunju, Jake Soenneker
doaj  

Automated Risk‐Based Cryptoperiod Calculation in ICSs: Analytical Framework and Software Tool

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 5, September/October 2025.
ABSTRACT Internal network and system reconnaissance is one of the first crucial stages of most cyber attacks, though it plays an especially important role in attacks on complex industrial control systems (ICSs) that span both IT and OT environments. Frequently, besides device enumeration and scanning, a malicious ICS reconnaissance campaign will also ...
Gabriele Cianfarani   +2 more
wiley   +1 more source

Multi-language oriented automatic realization method for cryptographic protocols

open access: yesTongxin xuebao, 2012
A multi-objective-language-oriented automatic code generation scheme for security protocols was put forward.First,based on XML,a description method for security protocols was designed.Second,a graphic user interface(GUI)was developed,through which the ...
Xing-hua LI   +3 more
doaj   +2 more sources

Entangled State Quantum Cryptography: Eavesdropping on the Ekert Protocol [PDF]

open access: green, 2000
Devang Naik   +4 more
openalex   +1 more source

Blockchain‐Based Federated Learning Methodologies in Smart Environments for Drone Technology

open access: yesIEEJ Transactions on Electrical and Electronic Engineering, Volume 20, Issue 9, Page 1393-1404, September 2025.
High‐security transactions are stored in a chain of blocks using blockchain technology. Security and privacy concerns may be addressed by using blockchain technology. Federated learning is a paradigm for increasing data mining accuracy and precision by ensuring data privacy and security for both internet of things (IoT) devices and users in smart ...
Mukkoti Maruthi Venkata Chalapathi   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy