Results 41 to 50 of about 1,501 (168)

Secure Group based Routing and Flawless Trust Formulation in MANET using Unsupervised Machine Learning Approach for IoT Applications [PDF]

open access: yesEAI Endorsed Transactions on Energy Web, 2019
INTRODUCTION: Mobile Adhoc Network (MANET) is integrated with Internet of Things (IoT) in many application cases due to its flexibility and scalability. The dynamic nature of MANET introduces some security threats in IoT environment.
Maitreyi Ponguwala, DR.Sreenivasa Rao
doaj   +1 more source

Design and Testing of a Computer Security Layer for the LIN Bus

open access: yesSensors, 2022
Most modern vehicles are connected to the internet via cellular networks for navigation, assistance, etc. via their onboard computer, which can also provide onboard Wi-Fi and Bluetooth services. The main in-vehicle communication buses (CAN, LIN, FlexRay)
Felipe Páez, Héctor Kaschel
doaj   +1 more source

Gene Regulatory Programs of NK Cells Show That NCAM1 (CD56) and KIRs Are Controlled by Genetically Polymorphic Distal Regulatory Elements

open access: yesEuropean Journal of Immunology, Volume 56, Issue 2, February 2026.
A deeper understanding of the natural killer cell gene expression regulation driving NK cell maturation and cytotoxicity could provide critical insights into optimizing NK therapies. Our findings reveal novel enhancers governing NK cell genes for NCAM1/CD56 and cis‐regulation for KIR receptors and clarify existing models of NK cell cis‐accessibility ...
Mariam A. Salem   +9 more
wiley   +1 more source

From Concept to Practice: A Blockchain‐Based Solution for Secure and Efficient Academic Credentials in Higher Education

open access: yesIET Blockchain, Volume 6, Issue 1, January/December 2026.
This paper addresses the critical need for secure diploma generation and verification in higher education by proposing and detailing the practical implementation of DIAR, a blockchain‐based framework. DIAR leverages blockchain's inherent security features and non‐fungible tokens for efficient, cost‐effective and tamper‐proof credential management ...
Avni Rustemi, Fisnik Dalipi
wiley   +1 more source

Long-Term Secure Distributed Storage Using Quantum Key Distribution Network With Third-Party Verification

open access: yesIEEE Transactions on Quantum Engineering, 2022
The quantum key distribution (QKD) network with Vernam's one-time pad encryption and secret sharing are powerful security tools to realize an information theoretically secure (ITS) distributed storage system.
Mikio Fujiwara   +5 more
doaj   +1 more source

Blockchain in Communication Networks: A Comprehensive Review

open access: yesIET Blockchain, Volume 6, Issue 1, January/December 2026.
This article provides a comprehensive review of blockchain applications in communication networks, focusing on domains such as IoT, 5G, vehicular systems, and decentralised trust infrastructures. It examines key challenges—including scalability, interoperability, and latency—and outlines future directions such as lightweight consensus protocols and AI ...
Quazi Mamun, Zhenni Pan, Jun Wu
wiley   +1 more source

A secure and efficient range query method for two‐layer wireless sensor networks

open access: yesIET Cyber-Physical Systems, 2022
Traditional range query methods of work still have shortcomings in node energy consumption and privacy security, so a two‐layer secure and efficient range query method for wireless sensor networks is proposed.
Yun Deng, Yanping Kang
doaj   +1 more source

C3Crowd$C^3Crowd$: Crowd Contributor and Consumer Framework for Secure Crowd Management Using Blockchain

open access: yesIET Blockchain, Volume 6, Issue 1, January/December 2026.
The study presents C3Crowd$C^3Crowd$, a blockchain‐based framework designed to enhance security in crowd management through decentralization, cryptography and smart contracts. It uses reputation management and a credit‐based incentive model to encourage user participation while safeguarding sensitive crowd data.
Sukanta Chakraborty, Abhishek Majumder
wiley   +1 more source

Key derivation function: key-hash based computational extractor and stream based pseudorandom expander [PDF]

open access: yesPeerJ Computer Science
The key derivation function is a specific cryptographic algorithm that transforms private string and public strings into one or more cryptographic keys.
Chai Wen Chuah   +2 more
doaj   +2 more sources

Digital‐Twin‐Enabled, Time‐Aware Anomaly Detection for Industrial Cyber‐Physical Systems

open access: yesDigital Twins and Applications, Volume 3, Issue 1, January/December 2026.
The graphical abstract (Graphical Abstract figure) summarises the proposed pipeline: multivariate ICS data streams are windowed and normalised, fed into a temporal LSTM–DNN encoder and per‐sensor operating‐envelope learner, combined via calibrated fusion and finally surfaced through an operator‐facing digital twin that provides event timelines, top ...
Wulfran Fendzi Mbasso   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy