Results 101 to 110 of about 80,415 (263)

Security-Enhanced Vehicle-to-Roadside Unit Authentication Scheme for Internet of Vehicles

open access: yesMathematics
Secure real-time data interaction between vehicles and transportation infrastructure, such as RSUs (V2R), can achieve intelligent and safe driving, as well as efficient travel services, in Internet of Vehicles (IoV), a secure and efficient V2R ...
Yan Sun, Qi Xie
doaj   +1 more source

A Q‐Learning Algorithm to Solve the Two‐Player Zero‐Sum Game Problem for Nonlinear Systems

open access: yesInternational Journal of Adaptive Control and Signal Processing, Volume 39, Issue 3, Page 566-581, March 2025.
A Q‐learning algorithm to solve the two‐player zero‐sum game problem for nonlinear systems. ABSTRACT This paper deals with the two‐player zero‐sum game problem, which is a bounded L2$$ {L}_2 $$‐gain robust control problem. Finding an analytical solution to the complex Hamilton‐Jacobi‐Issacs (HJI) equation is a challenging task.
Afreen Islam   +2 more
wiley   +1 more source

ObliviSync: Practical Oblivious File Backup and Synchronization [PDF]

open access: yes, 2016
Oblivious RAM (ORAM) protocols are powerful techniques that hide a client's data as well as access patterns from untrusted service providers. We present an oblivious cloud storage system, ObliviSync, that specifically targets one of the most widely-used ...
Aviv, Adam J.   +3 more
core   +1 more source

An Adaptive Human Pilot Model With Reaction Time Delay for Enhanced Adaptive Control in Piloted Systems

open access: yesInternational Journal of Adaptive Control and Signal Processing, EarlyView.
This work introduces an adaptive human pilot model that captures pilot time‐delay effects in adaptive control systems. The model enables the prediction of pilot–controller interactions, facilitating safer integration and improved design of adaptive controllers for piloted applications.
Abdullah Habboush, Yildiray Yildiz
wiley   +1 more source

Forward and Backward Private Searchable Encryption for Cloud-Assisted Industrial IoT

open access: yesSensors
In the cloud-assisted industrial Internet of Things (IIoT), since the cloud server is not always trusted, the leakage of data privacy becomes a critical problem. Dynamic symmetric searchable encryption (DSSE) allows for the secure retrieval of outsourced
Tianqi Peng   +7 more
doaj   +1 more source

Lattice Blind Signatures with Forward Security

open access: yes, 2020
Blind signatures play an important role in both electronic cash and electronic voting systems. Blind signatures should be secure against various attacks (such as signature forgeries). The work puts a special attention to secret key exposure attacks, which totally break digital signatures.
Le, Quoc Huy   +6 more
openaire   +4 more sources

What Do Large Language Models Know About Materials?

open access: yesAdvanced Engineering Materials, EarlyView.
If large language models (LLMs) are to be used inside the material discovery and engineering process, they must be benchmarked for the accurateness of intrinsic material knowledge. The current work introduces 1) a reasoning process through the processing–structure–property–performance chain and 2) a tool for benchmarking knowledge of LLMs concerning ...
Adrian Ehrenhofer   +2 more
wiley   +1 more source

Secure Beamforming via Amplify-and-Forward Relays in Machine-to-Machine Communications

open access: yesInternational Journal of Distributed Sensor Networks, 2013
We consider the collaborative use of amplify-and-forward relays to form a beamforming system and provide physical layer security for a wireless machine-to-machine (M2M) communication network. We investigate two objectives: (i) the achievable secrecy rate
Zhongjian Liu   +4 more
doaj   +1 more source

A Forward-Secure Digital Signature Scheme [PDF]

open access: yes, 1999
We describe a digital signature scheme in which the public key is fixed but the secret signing key is updated at regular intervals so as to provide a forward security property: compromise of the current secret key does not enable an adversary to forge signatures pertaining to the past.
Mihir Bellare, Sara K. Miner
openaire   +1 more source

Duplex Stainless Steel Laser‐Surface Textured: Stability in Brine Solution

open access: yesAdvanced Engineering Materials, EarlyView.
Controlled laser‐surface treatment (LST) of duplex DSS2205 steel is performed to increase its stability in brine solution under cyclic electrochemical assays. The superior protection with respect to flat and smooth panels is attributed to the presence of FeCr2O4 as the main protective oxide layer in the LST surface, after corrosion tests. The stability
Mohammad Rezayat   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy