Results 41 to 50 of about 6,039 (185)

Kyber AHE: An Easy-to-Implement Additive Homomorphic Encryption Scheme Based on Kyber and Its Application in Biometric Template Protection

open access: yesMathematics
Homomorphic encryption solutions tend to be costly in terms of memory and computational resources, making them difficult to implement. In this paper, we present Kyber AHE, a lightweight additive homomorphic encryption scheme for computing the addition ...
Roberto Román   +2 more
doaj   +1 more source

Towards Designing Artificial Universes for Artificial Agents under Interaction Closure [PDF]

open access: yes, 2014
We are interested in designing artificial universes for artificial agents. We view artificial agents as networks of highlevel processes on top of of a low-level detailed-description system.
Biehl, Martin   +2 more
core   +3 more sources

Post-Quantum Wireless-Based Key Encapsulation Mechanism via CRYSTALS-Kyber for Resource-Constrained Devices

open access: yesIEEE Access
We consider the problem of adapting a Post-Quantum cryptosystem to be used in resource-constrained devices, such as those typically used in Device-to-Device and Internet of Things systems.
M. A. Gonzalez de la Torre   +3 more
doaj   +1 more source

Hardware Security in the Connected World

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 15, Issue 3, September 2025.
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee   +4 more
wiley   +1 more source

Palindromic closures using multiple antimorphisms

open access: yes, 2013
Generalized pseudostandard word $\bf u$, as introduced in 2006 by de Luca and De Luca, is given by a directive sequence of letters from an alphabet ${\cal A}$ and by a directive sequence of involutory antimorphisms acting on ${\cal A}^*$.
Jajcayová, Tatiana   +2 more
core   +1 more source

Security in Metaverse Markets: Challenges and Solutions—A Comprehensive Review

open access: yesExpert Systems, Volume 42, Issue 8, August 2025.
ABSTRACT This review paper provides a systematic overview of the metaverse markets security problems and solutions. The metaverse is an emerging digital space, bridging virtual, augmented and mixed reality environments. As the metaverse evolves, issues related to customer security have emerged, which include breaches of privacy, thefts of identity and ...
Mohammad Z. Aloudat   +3 more
wiley   +1 more source

Wireless and Fiber-Based Post-Quantum-Cryptography-Secured IPsec Tunnel

open access: yesFuture Internet
In the near future, commercially accessible quantum computers are anticipated to revolutionize the world as we know it. These advanced machines are predicted to render traditional cryptographic security measures, deeply ingrained in contemporary ...
Daniel Christian Lawo   +6 more
doaj   +1 more source

Representation of States on Effect-Tribes and Effect Algebras by Integrals [PDF]

open access: yes, 2010
We describe $\sigma$-additive states on effect-tribes by integrals. Effect-tribes are monotone $\sigma$-complete effect algebras of functions where operations are defined by points.
Dvurečenskij, Anatolij
core   +1 more source

Development of breast tissue–mimicking electrical and acoustic phantoms for magneto‐acoustic electrical tomography

open access: yesAnnals of the New York Academy of Sciences, Volume 1547, Issue 1, Page 192-203, May 2025.
In this study, breast tissue–mimicking phantoms were developed to simulate the electrical conductivity, permittivity, and speed of sound of breast fat, glandular tissue, and tumors within the 1–8 MHz range for magneto‐acousto electrical tomography (MAET) experiments.
Reyhan Zengin, Nevzat Güneri Gençer
wiley   +1 more source

High-speed Parallel Implementation of Lattice-based Cryptography Based on AVX512 [PDF]

open access: yesJisuanji gongcheng
The rapid development of quantum computing seriously threatens the security of widely used public-key cryptography. Lattice-based cryptography occupies an essential position in Post-Quantum Cryptography(PQC) owing to its excellent anti-quantum security ...
Douwei LEI, Debiao HE, Min LUO, Cong PENG
doaj   +1 more source

Home - About - Disclaimer - Privacy