Results 31 to 40 of about 65,326 (236)

DEVELOPMENT OF THE DOUBLE-CONTOUR PROTECTION CONCEPT IN SOCIO-CYBERPHYSICAL SYSTEMS

open access: yesСучасні інформаційні системи, 2022
The rapid development of mobile Internet technologies LTE (Long-Term Evolution) not only predetermined the further development of cyber-physical systems, which are based on the synthesis of technologies of classical computer systems and LTE technologies,
Serhii Pohasii   +3 more
doaj   +1 more source

Pseudo Identities Based on Fingerprint Characteristics [PDF]

open access: yes, 2008
This paper presents the integrated project TURBINE which is funded under the EU 7th research framework programme. This research is a multi-disciplinary effort on privacy enhancing technology, combining innovative developments in cryptography and ...
Akkermans, Ton   +19 more
core   +3 more sources

A proposal for founding mistrustful quantum cryptography on coin tossing

open access: yes, 2003
A significant branch of classical cryptography deals with the problems which arise when mistrustful parties need to generate, process or exchange information.
A. Kent   +7 more
core   +1 more source

Symmetric physically unclonable functions of the arbiter type

open access: yesInformatika
Objectives. The problem of constructing a new class of physically unclonable functions of the arbiter type (APUF) that combines the advantages of both classical and balanced APUF is solved.
V. N. Yarmolik, A. A. Ivaniuk
doaj   +1 more source

Security improvement of using modified coherent state for quantum cryptography

open access: yes, 2005
Weak coherent states as a photon source for quantum cryptography have limit in secure data rate and transmission distance because of the presence of multi-photon events and loss in transmission line. Two-photon events in a coherent state can be taken out
C. Bennett   +8 more
core   +1 more source

Forty thousand kilometers under quantum protection

open access: yesScientific Reports, 2023
Quantum key distribution (QKD) is a revolutionary cryptography response to the rapidly growing cyberattacks threat posed by quantum computing. Yet, the roadblock limiting the vast expanse of secure quantum communication is the exponential decay of the ...
N. S. Kirsanov   +7 more
doaj   +1 more source

Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform

open access: yesFuture Internet, 2023
Highly constrained devices that are interconnected and interact to complete a task are being used in a diverse range of new fields. The Internet of Things (IoT), cyber-physical systems, distributed control systems, vehicular systems, wireless sensor ...
Mohammed El-hajj   +2 more
doaj   +1 more source

Ubic: Bridging the gap between digital cryptography and the physical world

open access: yes, 2014
Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all ...
D.M. Freeman   +6 more
core   +1 more source

Conditional entropic uncertainty relations for Tsallis entropies [PDF]

open access: yes, 2018
The entropic uncertainty relations are a very active field of scientific inquiry. Their applications include quantum cryptography and studies of quantum phenomena such as correlations and non-locality. In this work we find entanglement-dependent entropic
Kurzyk, Dariusz   +2 more
core   +2 more sources

Investigation of the physically unclonable function of a configurable ring oscillator

open access: yesInformatika
Objectives. Design and implementation features of a Physically Unclonable Function (PUF) based on a Configurable Ring Oscillator (CRO) on FPGA platforms are examined.
A. A. Ivaniuk
doaj   +1 more source

Home - About - Disclaimer - Privacy