Results 31 to 40 of about 65,326 (236)
DEVELOPMENT OF THE DOUBLE-CONTOUR PROTECTION CONCEPT IN SOCIO-CYBERPHYSICAL SYSTEMS
The rapid development of mobile Internet technologies LTE (Long-Term Evolution) not only predetermined the further development of cyber-physical systems, which are based on the synthesis of technologies of classical computer systems and LTE technologies,
Serhii Pohasii +3 more
doaj +1 more source
Pseudo Identities Based on Fingerprint Characteristics [PDF]
This paper presents the integrated project TURBINE which is funded under the EU 7th research framework programme. This research is a multi-disciplinary effort on privacy enhancing technology, combining innovative developments in cryptography and ...
Akkermans, Ton +19 more
core +3 more sources
A proposal for founding mistrustful quantum cryptography on coin tossing
A significant branch of classical cryptography deals with the problems which arise when mistrustful parties need to generate, process or exchange information.
A. Kent +7 more
core +1 more source
Symmetric physically unclonable functions of the arbiter type
Objectives. The problem of constructing a new class of physically unclonable functions of the arbiter type (APUF) that combines the advantages of both classical and balanced APUF is solved.
V. N. Yarmolik, A. A. Ivaniuk
doaj +1 more source
Security improvement of using modified coherent state for quantum cryptography
Weak coherent states as a photon source for quantum cryptography have limit in secure data rate and transmission distance because of the presence of multi-photon events and loss in transmission line. Two-photon events in a coherent state can be taken out
C. Bennett +8 more
core +1 more source
Forty thousand kilometers under quantum protection
Quantum key distribution (QKD) is a revolutionary cryptography response to the rapidly growing cyberattacks threat posed by quantum computing. Yet, the roadblock limiting the vast expanse of secure quantum communication is the exponential decay of the ...
N. S. Kirsanov +7 more
doaj +1 more source
Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform
Highly constrained devices that are interconnected and interact to complete a task are being used in a diverse range of new fields. The Internet of Things (IoT), cyber-physical systems, distributed control systems, vehicular systems, wireless sensor ...
Mohammed El-hajj +2 more
doaj +1 more source
Ubic: Bridging the gap between digital cryptography and the physical world
Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all ...
D.M. Freeman +6 more
core +1 more source
Conditional entropic uncertainty relations for Tsallis entropies [PDF]
The entropic uncertainty relations are a very active field of scientific inquiry. Their applications include quantum cryptography and studies of quantum phenomena such as correlations and non-locality. In this work we find entanglement-dependent entropic
Kurzyk, Dariusz +2 more
core +2 more sources
Investigation of the physically unclonable function of a configurable ring oscillator
Objectives. Design and implementation features of a Physically Unclonable Function (PUF) based on a Configurable Ring Oscillator (CRO) on FPGA platforms are examined.
A. A. Ivaniuk
doaj +1 more source

