Results 111 to 120 of about 32,420 (268)

Challenges and opportunities in mitigating sarcoptic mange in wild South American camelids

open access: yesThe Journal of Wildlife Management, Volume 90, Issue 1, January 2026.
Wild South American camelids—vicuña and guanaco—face threats from sarcoptic mange, a contagious skin disease linked to severe population declines. Despite its impact, major gaps remain in understanding disease dynamics. This review summarizes current knowledge, identifies key data and management gaps, and outlines urgent actions for effective ...
Alynn M. Martin   +13 more
wiley   +1 more source

Let us walk on the 3-isogeny graph: efficient, fast, and simple

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Constructing and implementing isogeny-based cryptographic primitives is an active research. In particular, performing length-n isogenies walks over quadratic field extensions of Fp plays an exciting role in some constructions, including Hash functions ...
Jesús-Javier Chi-Domínguez   +2 more
doaj   +1 more source

A Hybrid Transformer–CNN Framework for Semantic Behavioral Modeling in Office Malware Detection

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Office documents have emerged as a prevalent attack vector, with adversaries increasingly embedding executable payloads and malicious macros to evade signature‐based detection mechanisms. To address these challenges, this study presents a hybrid Transformer–CNN semantic behavioral modeling framework for Office malware detection.
Sheikh M. Zeeshan Javed   +4 more
wiley   +1 more source

Vehicle Communication using Hash Chain-based Secure Cluster

open access: yes, 2019
We introduce a hash chain-based secure cluster. Here, secure cluster refers to a set of vehicles having vehicular secrecy capacity of more than a reference value. Since vehicle communication is performed in such a secure cluster, basically secure vehicle communication can be expected.
Ahn, Na-Young, Lee, Dong Hoon
openaire   +2 more sources

T/Key: Second-Factor Authentication From Secure Hash Chains [PDF]

open access: green, 2017
Dmitry Kogan, Nathan Manohar, Dan Boneh
openalex   +1 more source

Digital‐Twin‐Enabled, Time‐Aware Anomaly Detection for Industrial Cyber‐Physical Systems

open access: yesDigital Twins and Applications, Volume 3, Issue 1, January/December 2026.
The graphical abstract (Graphical Abstract figure) summarises the proposed pipeline: multivariate ICS data streams are windowed and normalised, fed into a temporal LSTM–DNN encoder and per‐sensor operating‐envelope learner, combined via calibrated fusion and finally surfaced through an operator‐facing digital twin that provides event timelines, top ...
Wulfran Fendzi Mbasso   +5 more
wiley   +1 more source

Design and Implementation of XGBoost‐Based Cyberattack Detection and Blockchain‐Enabled Charging Station

open access: yesDigital Twins and Applications, Volume 3, Issue 1, January/December 2026.
The charging station (CS) plays a crucial role in charging electric vehicles. Therefore, it is necessary to protect the CS from cyberattacks. This paper proposes an architecture for the security of the EV fleet during charging using the XGBoost model and Hyperledger Fabric to protect battery management systems (BMS) from cyberattacks.
Gaurav Kumar, Suresh Mikkili
wiley   +1 more source

Practical anamorphic group signature scheme based on MAYO

open access: yesJournal of King Saud University: Computer and Information Sciences
With the advancement of quantum computing and increasing demands for privacy protection in decentralized applications such as blockchain, digital signature schemes face significant challenges in simultaneously achieving anonymity, traceability, and ...
Zhang Yanshuo   +5 more
doaj   +1 more source

Blockchain‐Enabled Privacy‐Preserving Access Control for EHRs Sharing With Optimized User and Attribute Revocation

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Electronic health records (EHRs) have become a crucial application in cloud computing environments, necessitating advanced privacy‐preserving access control mechanisms. Ciphertext policy attribute‐based encryption (CP‐ABE) is a widely recognized solution for secure access control in outsourced data environments.
Khanadech Worapaluk   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy