Results 41 to 50 of about 4,501,528 (307)
DEVELOPMENT OF THE DOUBLE-CONTOUR PROTECTION CONCEPT IN SOCIO-CYBERPHYSICAL SYSTEMS
The rapid development of mobile Internet technologies LTE (Long-Term Evolution) not only predetermined the further development of cyber-physical systems, which are based on the synthesis of technologies of classical computer systems and LTE technologies,
Serhii Pohasii +3 more
doaj +1 more source
Nanoscale physical unclonable function labels based on block copolymer self-assembly
Hardware-based cryptography that exploits physical unclonable functions is required for the secure identification and authentication of devices in the Internet of Things.
Jang Hwan Kim +13 more
semanticscholar +1 more source
Cavity-QED entangled photon source based on two truncated Rabi oscillations [PDF]
We discuss a cavity-QED scheme to deterministically generate entangled photons pairs by using a three-level atom successively coupled to two single longitudinal mode high-Q cavities presenting polarization degeneracy.
Akopian +34 more
core +2 more sources
Why Quantum Bit Commitment And Ideal Quantum Coin Tossing Are Impossible [PDF]
There had been well known claims of unconditionally secure quantum protocols for bit commitment. However, we, and independently Mayers, showed that all proposed quantum bit commitment schemes are, in principle, insecure because the sender, Alice, can ...
Ardehali +28 more
core +2 more sources
Securing NextG networks with physical-layer key generation: A survey
As the development of next-generation (NextG) communication networks continues, tremendous devices are accessing the network and the amount of information is exploding.
Qingjiang Xiao +4 more
semanticscholar +1 more source
Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform
Highly constrained devices that are interconnected and interact to complete a task are being used in a diverse range of new fields. The Internet of Things (IoT), cyber-physical systems, distributed control systems, vehicular systems, wireless sensor ...
Mohammed El-hajj +2 more
doaj +1 more source
A proposal for founding mistrustful quantum cryptography on coin tossing
A significant branch of classical cryptography deals with the problems which arise when mistrustful parties need to generate, process or exchange information.
A. Kent +7 more
core +1 more source
Security improvement of using modified coherent state for quantum cryptography
Weak coherent states as a photon source for quantum cryptography have limit in secure data rate and transmission distance because of the presence of multi-photon events and loss in transmission line. Two-photon events in a coherent state can be taken out
C. Bennett +8 more
core +1 more source
Forty thousand kilometers under quantum protection
Quantum key distribution (QKD) is a revolutionary cryptography response to the rapidly growing cyberattacks threat posed by quantum computing. Yet, the roadblock limiting the vast expanse of secure quantum communication is the exponential decay of the ...
N. S. Kirsanov +7 more
doaj +1 more source
Cryptographic Data Security for Reliable Wireless Sensor Network
Wireless Sensor Networks (WSNs) are widely utilized in a variety of applications. Attackers might interfere with equipment, and eavesdrop on conversations.
Shabana Urooj +4 more
doaj +1 more source

