Results 41 to 50 of about 2,385 (165)

Enhancing E‐Commerce Security Based on Involution Function Using Twin Key AES Cipher

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
In the realm of surging e‐commerce data and increasing digital transactions, ensuring end‐to‐end security is paramount to protect sensitive information and maintain user trust. The Advanced Encryption Standard (AES), a cornerstone of network security, relies on symmetric key encryption for secure communication.
Biresh Kumar   +11 more
wiley   +1 more source

Perfect secrecy cryptosystem with nonuniform distribution of keys

open access: yesTongxin xuebao, 2018
More strictly mathematical concepts of infinite perfect secrecy and random “one-time pad” cryptosystem in theory were presented,and the whole secure communication system was divided into two stages:design of a basic cryptosystem and one of its ...
Chuanjun TIAN
doaj   +2 more sources

Resisting Quantum Key Distribution Attacks Using Quantum Machine Learning

open access: yesIET Quantum Communication, Volume 7, Issue 1, January/December 2026.
Quantum key distribution (QKD) promises secure communication but remains vulnerable to advanced quantum attacks. We propose a hybrid quantum long short‐term memory (QLSTM) model that combines quantum‐enhanced learning with classical deep learning to detect attacks such as photon‐number splitting, Trojan‐Horse and detector blinding.
Ali Al‐Kuwari   +4 more
wiley   +1 more source

Quantum‐Resistant Security in Digital Twin Healthcare Systems

open access: yesIET Wireless Sensor Systems, Volume 16, Issue 1, January/December 2026.
Quantum‐safe architecture for secure healthcare data transmission integrating QKD, edge devices, and cloud‐based Digital Twin analytics. ABSTRACT The development of digital twin (DT) systems for healthcare presents several challenges, particularly in ensuring data protection and communication security in real‐time environments.
Ahmed K. Jameil, Hamed Al‐Raweshidy
wiley   +1 more source

Analisys of Lattice-based Public Key Cryptosystems

open access: yesБезопасность информационных технологий, 2011
Mathematical problems for lattice-based public key cryptosystem design are analyzed. A method of constructing theoretically strong against quantum attacks cryptosystem is proposed.
A. R. Orlov, E. B. Makhovenko
doaj  

Safe and Quickest Medical Image Encryption Using Logistic Map Derived S‐Boxes and Galois Field

open access: yesComputational and Mathematical Methods, Volume 2026, Issue 1, 2026.
The pseudorandomness, simplicity of use, and extreme sensitivity to even the slightest change in the initial value and handling parameters make chaotic maps attractive. The use of medical imaging to diagnose illnesses has grown in significance. These photographs need strong security measures because they are exchanged over public networks.
Mahwish Bano   +5 more
wiley   +1 more source

A McEliece cryptosystem using permutation codes

open access: yesJournal of Mathematical Cryptology
This paper is an attempt to build a new public-key cryptosystem, similar to the McEliece cryptosystem, using permutation error-correcting codes. We study a public-key cryptosystem built using two permutation error-correcting codes.
Srinivasan Adarsh, Mahalanobis Ayan
doaj   +1 more source

PQ‐AuthN‐IIoT: A Lightweight, LWE‐Based Postquantum and Privacy‐Preserving Mutual Authentication Scheme for Resource‐Constrained Industrial IoT Systems

open access: yesJournal of Computer Networks and Communications, Volume 2026, Issue 1, 2026.
The rapid expansion of the Industrial Internet of Things (IIoT) presents pressing challenges for secure, efficient, and privacy‐preserving communication among users, sensors, and cloud infrastructures. Existing lightweight authentication schemes, primarily based on classical cryptographic assumptions, are increasingly vulnerable to the emerging threat ...
Tinashe Magara   +2 more
wiley   +1 more source

Energy Efficient Encryption Algorithm for Low Resources Devices

open access: yesARCHive-SR, 2019
Saving energy is one of the most challenging aspects in the wireless network devices. Such devices are connected together to perform a certain task. A well-known example of these structures is the Wireless Sensor Network (WSN).
Bassam W. Aboshosha   +2 more
doaj   +1 more source

A Secure and Robust Blockchain‐Based Medical Image Encryption Approach Using Lorenz Chaotic System

open access: yesJournal of Sensors, Volume 2026, Issue 1, 2026.
Keeping medical images confidential while transmitting is crucial, especially in an open networking environment. One effective approach is blockchain‐based encryption, which provides strong security for sensitive healthcare data. To ensure the greatest levels of medical data integrity and authenticity, our proposed scheme employs a unique Lorenz ...
Fahima Hajjej   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy