Results 31 to 40 of about 2,903 (146)
PUF-Based Post-Quantum CAN-FD Framework for Vehicular Security
The Controller Area Network (CAN) is a bus protocol widely used in Electronic control Units (ECUs) to communicate between various subsystems in vehicles. Insecure CAN networks can allow attackers to control information between vital vehicular subsystems.
Tyler Cultice, Himanshu Thapliyal
doaj +1 more source
This paper addresses the limitations of existing conditional privacy‐preserving authentication (CPPA) schemes in vehicular ad hoc networks (VANETs), which are either computationally heavy or vulnerable to quantum attacks. It proposes a multi‐aggregator lattice‐based CPPA (MA‐LCPPA) framework that distributes verification across multiple roadside units ...
Adi El‐Dalahmeh, Jie Li
wiley +1 more source
Retrofitting Post-Quantum Cryptography in Internet Protocols:A Case Study of DNSSEC [PDF]
Quantum computing is threatening current cryptography, especially the asymmetric algorithms used in many Internet protocols. More secure algorithms, colloquially referred to as Post-Quantum Cryptography (PQC), are under active development.
de Jong, Jins +4 more
core +3 more sources
Quantum Machine Learning Applications to Medical Images: A Survey
In this review paper, we provide an outline of quantum neural networks (QNNs), quantum convolution neural networks (QCNNs) and various hybrid models. We also explore human brain‐inspired quantum neuromorphic computing by the quantum spiking neural networks (QSNN).
Mahua Nandy Pal +2 more
wiley +1 more source
Research on Development Progress and Test Evaluation of Post-Quantum Cryptography
With the rapid development of quantum computing technology, traditional cryptographic systems are facing unprecedented challenges. Post-Quantum Cryptography (PQC), as a new cryptographic technology that can resist attacks from quantum computers, has ...
Meng Zhang +6 more
doaj +1 more source
Cybersecurity Driven Quantum Digital Twin for Proactive Threat Reversal in Open RAN
This paper presents a novel cybersecurity‐driven quantum digital twin (CQDT) architecture for proactive defence in 6G Open RAN. By integrating quantum observables and reinforcement learning, the framework maintains high fidelity and suppresses entropy under adversarial CPTP noise. CQDT achieves real‐time adaptation with sub‐20 ms latency, meeting URLLC
Yassir Al‐Karawi +2 more
wiley +1 more source
Resisting Quantum Key Distribution Attacks Using Quantum Machine Learning
Quantum key distribution (QKD) promises secure communication but remains vulnerable to advanced quantum attacks. We propose a hybrid quantum long short‐term memory (QLSTM) model that combines quantum‐enhanced learning with classical deep learning to detect attacks such as photon‐number splitting, Trojan‐Horse and detector blinding.
Ali Al‐Kuwari +4 more
wiley +1 more source
Security in Post-Quantum Era: A Comprehensive Survey on Lattice-Based Algorithms
Lattice-based post-quantum cryptography (PQC) has attracted significant attention as a promising solution to the security challenges posed by quantum computing.
Hien Nguyen +3 more
doaj +1 more source
Quantum‐Resistant Security in Digital Twin Healthcare Systems
Quantum‐safe architecture for secure healthcare data transmission integrating QKD, edge devices, and cloud‐based Digital Twin analytics. ABSTRACT The development of digital twin (DT) systems for healthcare presents several challenges, particularly in ensuring data protection and communication security in real‐time environments.
Ahmed K. Jameil, Hamed Al‐Raweshidy
wiley +1 more source
The pace of quantum computing development necessitates not only the adoption of post-quantum cryptographic algorithms, but also the establishment of an executable and auditable institutional transition process.
Berat Birgin, Baris Celiktas
doaj +1 more source

