Results 101 to 110 of about 80,415 (263)
Security-Enhanced Vehicle-to-Roadside Unit Authentication Scheme for Internet of Vehicles
Secure real-time data interaction between vehicles and transportation infrastructure, such as RSUs (V2R), can achieve intelligent and safe driving, as well as efficient travel services, in Internet of Vehicles (IoV), a secure and efficient V2R ...
Yan Sun, Qi Xie
doaj +1 more source
A Q‐Learning Algorithm to Solve the Two‐Player Zero‐Sum Game Problem for Nonlinear Systems
A Q‐learning algorithm to solve the two‐player zero‐sum game problem for nonlinear systems. ABSTRACT This paper deals with the two‐player zero‐sum game problem, which is a bounded L2$$ {L}_2 $$‐gain robust control problem. Finding an analytical solution to the complex Hamilton‐Jacobi‐Issacs (HJI) equation is a challenging task.
Afreen Islam +2 more
wiley +1 more source
ObliviSync: Practical Oblivious File Backup and Synchronization [PDF]
Oblivious RAM (ORAM) protocols are powerful techniques that hide a client's data as well as access patterns from untrusted service providers. We present an oblivious cloud storage system, ObliviSync, that specifically targets one of the most widely-used ...
Aviv, Adam J. +3 more
core +1 more source
This work introduces an adaptive human pilot model that captures pilot time‐delay effects in adaptive control systems. The model enables the prediction of pilot–controller interactions, facilitating safer integration and improved design of adaptive controllers for piloted applications.
Abdullah Habboush, Yildiray Yildiz
wiley +1 more source
Forward and Backward Private Searchable Encryption for Cloud-Assisted Industrial IoT
In the cloud-assisted industrial Internet of Things (IIoT), since the cloud server is not always trusted, the leakage of data privacy becomes a critical problem. Dynamic symmetric searchable encryption (DSSE) allows for the secure retrieval of outsourced
Tianqi Peng +7 more
doaj +1 more source
Lattice Blind Signatures with Forward Security
Blind signatures play an important role in both electronic cash and electronic voting systems. Blind signatures should be secure against various attacks (such as signature forgeries). The work puts a special attention to secret key exposure attacks, which totally break digital signatures.
Le, Quoc Huy +6 more
openaire +4 more sources
What Do Large Language Models Know About Materials?
If large language models (LLMs) are to be used inside the material discovery and engineering process, they must be benchmarked for the accurateness of intrinsic material knowledge. The current work introduces 1) a reasoning process through the processing–structure–property–performance chain and 2) a tool for benchmarking knowledge of LLMs concerning ...
Adrian Ehrenhofer +2 more
wiley +1 more source
Secure Beamforming via Amplify-and-Forward Relays in Machine-to-Machine Communications
We consider the collaborative use of amplify-and-forward relays to form a beamforming system and provide physical layer security for a wireless machine-to-machine (M2M) communication network. We investigate two objectives: (i) the achievable secrecy rate
Zhongjian Liu +4 more
doaj +1 more source
A Forward-Secure Digital Signature Scheme [PDF]
We describe a digital signature scheme in which the public key is fixed but the secret signing key is updated at regular intervals so as to provide a forward security property: compromise of the current secret key does not enable an adversary to forge signatures pertaining to the past.
Mihir Bellare, Sara K. Miner
openaire +1 more source
Duplex Stainless Steel Laser‐Surface Textured: Stability in Brine Solution
Controlled laser‐surface treatment (LST) of duplex DSS2205 steel is performed to increase its stability in brine solution under cyclic electrochemical assays. The superior protection with respect to flat and smooth panels is attributed to the presence of FeCr2O4 as the main protective oxide layer in the LST surface, after corrosion tests. The stability
Mohammad Rezayat +5 more
wiley +1 more source

