Results 131 to 140 of about 63,614 (274)
Generic Quantum‐Safe IIoT Forensics Framework (QS‐IIoT‐F) ABSTRACT The continuous evolution of quantum computing has shown novel and transformative possibilities and critical implications for the Industrial Internet of Things (IIoT) forensic processes.
Victor R. Kebande
wiley +1 more source
Russian Cryptographic Algorithms in the Identity Management Systems
The subject of the research is to implement Russian cryptographic algorithms in the IdM-systems. The research centers on the study of the claim-based authentication protocols and the existing IdM-systems and on the development of an authentication module
A.V. Dubovitskaya, P. V. Smirnov
doaj
Hardware Security in the Connected World
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee+4 more
wiley +1 more source
A Guide to Machine Learning Epistemic Ignorance, Hidden Paradoxes, and Other Tensions
ABSTRACT Machine learning (ML) has rapidly scaled in capacity and complexity, yet blind spots persist beneath its high performance façade. In order to shed more light on this argument, this paper presents a curated catalogue of 175 unconventional concepts, each capturing a paradox, tension, or overlooked risk in modern ML practice.
M. Z. Naser
wiley +1 more source
Abstract This article examines the intersection of Asia's blockchain industry and special economic zones (SEZs). SEZs have been promoted to localise blockchain technology by disparate actors from cyberlibertarian figures to Asian blockchain firms, national policymakers, and local politicians.
Jamie Doucette, Seung‐Ook Lee
wiley +1 more source
Decentralization, Blockchain, Artificial Intelligence (AI): Challenges and Opportunities
ABSTRACT New technologies like blockchain allow firms to decentralize core functions, forcing managers to reconsider the trade‐off between closed, proprietary control and open strategies that involve external contributors. While proponents often advocate for full decentralization, we argue this view overlooks important economic trade‐offs.
Xiang Hui, Catherine Tucker
wiley +1 more source
A Simple and Efficient Approach to Verifying Cryptographic Protocols [PDF]
Yongxing Sun, Xinmei Wang
openalex +1 more source
ABSTRACT E‐learning systems in an educational environment designed for wireless area networks for schools, universities, and research institutions provide consistency and better retention for students, professors, and researchers. An E‐learning system is known for storing lecture documents and live video conferences that are transmitted over public ...
Ahmed A. Mawgoud+4 more
wiley +1 more source
A research on cross‐chain and interoperation methods of fusion protocol
At present, cross‐chain technology and cross‐chain system pay more attention to cross‐chain security and performance, and have shown great improvement in security, scalability and efficiency. However, the generality of cross‐chain technology in different
Li Ming+4 more
doaj +1 more source
Universally composable security: a new paradigm for cryptographic protocols [PDF]
Ran Canetti
openalex +1 more source