Results 71 to 80 of about 308,714 (183)

Strengthening the Authentication Mechanism of Blockchain-Based E-Voting System Using Post-Quantum Cryptography

open access: yesJOIN: Jurnal Online Informatika
Election systems often face severe challenges regarding security and trust. Threats such as vote falsification and lack of transparency in vote counting have shaken the integrity of elections in various countries.
Sonitema Laia, Ari Moesriami Barmawi
doaj   +1 more source

An elderly man with an air-fluid level in the middle ear [PDF]

open access: yesMalaysian Family Physician, 2017
A 68-year-old Malay man who is a rubber tapper, presented with a large painful right-sided neck swelling for 6 months, which was gradually increasing in size and associated with odynophagia, dysphagia, hoarseness and significant weight loss. He did not
Irfan Mohamad , Sakinah Mohamad
doaj  

PUF-AQKD: A Hardware-Assisted Quantum Key Distribution Protocol for Man-in-the-Middle Attack Mitigation

open access: yesIEEE Open Journal of the Communications Society
The Quantum Key Distribution (QKD) protocol utilizes quantum mechanics principles for cryptographic key exchange, ensuring absolute secrecy. Current QKD techniques are susceptible to man-in-the-middle (MITM) attacks due to the absence of an inherent ...
Ashutosh Bhatia   +2 more
doaj   +1 more source

Man-In-The-Middle Attacks Targeting Quantum Cryptography

open access: yes2025 International Conference on Intelligent Communication Networks and Computational Techniques (ICICNCT)
The development of the Willow quantum chip by Google has sparked significant interest in quantum computing, ushering in a new wave of advancements in the field. As quantum computing technology continues to mature, secure quantum communication has garnered increasing attention.
openaire   +2 more sources

A secure IoT-edge architecture with data-driven AI techniques for early detection of cyber threats in healthcare

open access: yesDiscover Internet of Things
The latest developments in the Internet of Medical Things (IoMT) have transformed healthcare, allowing for the easy transmission of sensitive data across networked medical equipment.
Mamta Kumari   +2 more
doaj   +1 more source

Deep learning approaches for protecting IoT devices in smart homes from MitM attacks

open access: yesFrontiers in Computer Science
The primary objective of this paper is to enhance the security of IoT devices in Software-Defined Networking (SDN) environments against Man-in-the-Middle (MitM) attacks in smart homes using Artificial Intelligence (AI) methods as part of an Intrusion ...
Nader Karmous   +6 more
doaj   +1 more source

Enhancing Security in International Data Spaces: A STRIDE Framework Approach

open access: yesTechnologies
The proliferation of Internet of Things (IoT) devices and big data has catalyzed the emergence of data markets. Regulatory and technological frameworks such as International Data Spaces (IDS) have been developed to facilitate secure data exchange while ...
Nikola Gavric   +4 more
doaj   +1 more source

Robust authentication key agreement protocol for cross-domain data security

open access: yesTongxin xuebao
Towards the need for cross-domain data security, a corresponding system model and security model were presented, and a TEE-based robust authenticated key agreement protocol was proposed.
ZHANG Jinghui   +4 more
doaj  

Home - About - Disclaimer - Privacy