Results 31 to 40 of about 2,903 (146)

PUF-Based Post-Quantum CAN-FD Framework for Vehicular Security

open access: yesInformation, 2022
The Controller Area Network (CAN) is a bus protocol widely used in Electronic control Units (ECUs) to communicate between various subsystems in vehicles. Insecure CAN networks can allow attackers to control information between vital vehicular subsystems.
Tyler Cultice, Himanshu Thapliyal
doaj   +1 more source

MA‐LCPPA: A Multi‐Aggregator Lattice‐Based Conditional Privacy‐Preserving Authentication Scheme for Scalable and Quantum‐Secure VANETs

open access: yesIET Intelligent Transport Systems, Volume 20, Issue 1, January/December 2026.
This paper addresses the limitations of existing conditional privacy‐preserving authentication (CPPA) schemes in vehicular ad hoc networks (VANETs), which are either computationally heavy or vulnerable to quantum attacks. It proposes a multi‐aggregator lattice‐based CPPA (MA‐LCPPA) framework that distributes verification across multiple roadside units ...
Adi El‐Dalahmeh, Jie Li
wiley   +1 more source

Retrofitting Post-Quantum Cryptography in Internet Protocols:A Case Study of DNSSEC [PDF]

open access: yes, 2020
Quantum computing is threatening current cryptography, especially the asymmetric algorithms used in many Internet protocols. More secure algorithms, colloquially referred to as Post-Quantum Cryptography (PQC), are under active development.
de Jong, Jins   +4 more
core   +3 more sources

Quantum Machine Learning Applications to Medical Images: A Survey

open access: yesIET Quantum Communication, Volume 7, Issue 1, January/December 2026.
In this review paper, we provide an outline of quantum neural networks (QNNs), quantum convolution neural networks (QCNNs) and various hybrid models. We also explore human brain‐inspired quantum neuromorphic computing by the quantum spiking neural networks (QSNN).
Mahua Nandy Pal   +2 more
wiley   +1 more source

Research on Development Progress and Test Evaluation of Post-Quantum Cryptography

open access: yesEntropy
With the rapid development of quantum computing technology, traditional cryptographic systems are facing unprecedented challenges. Post-Quantum Cryptography (PQC), as a new cryptographic technology that can resist attacks from quantum computers, has ...
Meng Zhang   +6 more
doaj   +1 more source

Cybersecurity Driven Quantum Digital Twin for Proactive Threat Reversal in Open RAN

open access: yesIET Quantum Communication, Volume 7, Issue 1, January/December 2026.
This paper presents a novel cybersecurity‐driven quantum digital twin (CQDT) architecture for proactive defence in 6G Open RAN. By integrating quantum observables and reinforcement learning, the framework maintains high fidelity and suppresses entropy under adversarial CPTP noise. CQDT achieves real‐time adaptation with sub‐20 ms latency, meeting URLLC
Yassir Al‐Karawi   +2 more
wiley   +1 more source

Resisting Quantum Key Distribution Attacks Using Quantum Machine Learning

open access: yesIET Quantum Communication, Volume 7, Issue 1, January/December 2026.
Quantum key distribution (QKD) promises secure communication but remains vulnerable to advanced quantum attacks. We propose a hybrid quantum long short‐term memory (QLSTM) model that combines quantum‐enhanced learning with classical deep learning to detect attacks such as photon‐number splitting, Trojan‐Horse and detector blinding.
Ali Al‐Kuwari   +4 more
wiley   +1 more source

Security in Post-Quantum Era: A Comprehensive Survey on Lattice-Based Algorithms

open access: yesIEEE Access
Lattice-based post-quantum cryptography (PQC) has attracted significant attention as a promising solution to the security challenges posed by quantum computing.
Hien Nguyen   +3 more
doaj   +1 more source

Quantum‐Resistant Security in Digital Twin Healthcare Systems

open access: yesIET Wireless Sensor Systems, Volume 16, Issue 1, January/December 2026.
Quantum‐safe architecture for secure healthcare data transmission integrating QKD, edge devices, and cloud‐based Digital Twin analytics. ABSTRACT The development of digital twin (DT) systems for healthcare presents several challenges, particularly in ensuring data protection and communication security in real‐time environments.
Ahmed K. Jameil, Hamed Al‐Raweshidy
wiley   +1 more source

From Policy to Practice: A Sector-Agnostic Operational Framework for Post-Quantum Cryptography Transition

open access: yesIEEE Access
The pace of quantum computing development necessitates not only the adoption of post-quantum cryptographic algorithms, but also the establishment of an executable and auditable institutional transition process.
Berat Birgin, Baris Celiktas
doaj   +1 more source

Home - About - Disclaimer - Privacy