Results 171 to 180 of about 1,862,454 (331)

Review on 6G communication and its architecture, technologies included, challenges, security challenges and requirements, applications, with respect to AI domain

open access: yesIET Quantum Communication, EarlyView.
This paper presents an overview of the various aspects of 6G communication architecture, focusing on its technologies, challenges, and applications within the domain of artificial intelligence (AI). The paper explores the evolving landscape of wireless communication, delving into the anticipated features and capabilities of 6G networks.
Pranita Bhide   +2 more
wiley   +1 more source

A research on cross‐chain and interoperation methods of fusion protocol

open access: yesIET Blockchain
At present, cross‐chain technology and cross‐chain system pay more attention to cross‐chain security and performance, and have shown great improvement in security, scalability and efficiency. However, the generality of cross‐chain technology in different
Li Ming   +4 more
doaj   +1 more source

On Classical and Quantum Cryptography [PDF]

open access: yesarXiv, 2001
Lectures on classical and quantum cryptography. Contents: Private key cryptosystems. Elements of number theory. Public key cryptography and RSA cryptosystem. Shannon`s entropy and mutual information. Entropic uncertainty relations. The no cloning theorem. The BB84 quantum cryptographic protocol. Security proofs. Bell`s theorem.
arxiv  

Entangled State Quantum Cryptography: Eavesdropping on the Ekert Protocol [PDF]

open access: green, 2000
Devang Naik   +4 more
openalex   +1 more source

A Quantum Cryptographic Protocol with Detection of Compromised Server [PDF]

open access: yesarXiv, 2003
This paper presents a hybrid cryptographic protocol, using quantum and classical resources, to generate a key for authentication and optionally for encryption in a network. One or more trusted servers distribute streams of entangled photons to individual resources that seek to communicate.
arxiv  

Multi-language oriented automatic realization method for cryptographic protocols

open access: yesTongxin xuebao, 2012
A multi-objective-language-oriented automatic code generation scheme for security protocols was put forward.First,based on XML,a description method for security protocols was designed.Second,a graphic user interface(GUI)was developed,through which the ...
Xing-hua LI   +3 more
doaj   +2 more sources

Ejafa_protocol: A custom INC secure protocol [PDF]

open access: yesarXiv
"EJAFA_PROTOCOL: A CUSTOM INC SECURE PROTOCOL" presents a cryptographic solution tailored for lightweight devices, striking a delicate balance between security and efficiency. The protocol incorporates modern cryptographic primitives, including X25519 for key exchange and ChaCha20 for encryption, while adhering to established RFC standards.
arxiv  

ECKOchain: A FAIR blockchain‐based database for long‐term ecological data

open access: yesMethods in Ecology and Evolution, EarlyView.
Abstract Open data practices in ecology are increasingly accepted, yet primary long‐term ecological data remain hard to find. Barriers preventing open long‐term ecological data include social and economic constructs such as a sense of data proprietorship and fear of misuse of complex datasets. To incentivise open primary ecological data and ensure long‐
Kjell‐Erik Marstein   +2 more
wiley   +1 more source

Blockchain technology disruptions: Exploring accounting and auditing academics and practitioners' perception

open access: yesAccounting &Finance, EarlyView.
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy