Results 31 to 40 of about 3,134 (166)

Secure Deployment of Smart Meters

open access: yesIET Generation, Transmission &Distribution, Volume 20, Issue 1, January/December 2026.
A secure initialization process for smart meters is designed based on a systematic cybersecurity risk analysis of the deployment phase. Three initialization variants are defined and compared with respect to security, operational feasibility, and trust distribution.
David Kohout   +4 more
wiley   +1 more source

MA‐LCPPA: A Multi‐Aggregator Lattice‐Based Conditional Privacy‐Preserving Authentication Scheme for Scalable and Quantum‐Secure VANETs

open access: yesIET Intelligent Transport Systems, Volume 20, Issue 1, January/December 2026.
This paper addresses the limitations of existing conditional privacy‐preserving authentication (CPPA) schemes in vehicular ad hoc networks (VANETs), which are either computationally heavy or vulnerable to quantum attacks. It proposes a multi‐aggregator lattice‐based CPPA (MA‐LCPPA) framework that distributes verification across multiple roadside units ...
Adi El‐Dalahmeh, Jie Li
wiley   +1 more source

PUF-Based Post-Quantum CAN-FD Framework for Vehicular Security

open access: yesInformation, 2022
The Controller Area Network (CAN) is a bus protocol widely used in Electronic control Units (ECUs) to communicate between various subsystems in vehicles. Insecure CAN networks can allow attackers to control information between vital vehicular subsystems.
Tyler Cultice, Himanshu Thapliyal
doaj   +1 more source

Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts [PDF]

open access: yes, 2017
We provide a tight security proof for an IND-CCA Ring-LWE based Key Encapsulation Mechanism that is derived from a generic construction of Dent (IMA Cryptography and Coding, 2003). Such a tight reduction is not known for the generic construction.
AW Dent   +23 more
core   +2 more sources

Integrating Elliptic Curve Encryption and Post‐Quantum Cryptography for Secure VANETs Using Fog Computing and SDN

open access: yesIET Intelligent Transport Systems, Volume 20, Issue 1, January/December 2026.
This paper presents a hybrid security framework for vehicular ad hoc networks that combines lightweight elliptic curve cryptography with quantum‐resistant post‐quantum cryptography, coordinated through fog computing and software‐defined networking.
Adi El‐Dalahmeh   +2 more
wiley   +1 more source

Security in Post-Quantum Era: A Comprehensive Survey on Lattice-Based Algorithms

open access: yesIEEE Access
Lattice-based post-quantum cryptography (PQC) has attracted significant attention as a promising solution to the security challenges posed by quantum computing.
Hien Nguyen   +3 more
doaj   +1 more source

The roles of quantum correlations in quantum cloning

open access: yes, 2014
In this paper, we study the entanglement and quantum discord of the output modes in the unified $1\rightarrow 2$ state-dependent cloning and probabilistic quantum cloning. The tripartite entanglement among the output modes and the quantum cloning machine
Wu, Shao-xiong   +2 more
core   +1 more source

Quantum Machine Learning Applications to Medical Images: A Survey

open access: yesIET Quantum Communication, Volume 7, Issue 1, January/December 2026.
In this review paper, we provide an outline of quantum neural networks (QNNs), quantum convolution neural networks (QCNNs) and various hybrid models. We also explore human brain‐inspired quantum neuromorphic computing by the quantum spiking neural networks (QSNN).
Mahua Nandy Pal   +2 more
wiley   +1 more source

From Policy to Practice: A Sector-Agnostic Operational Framework for Post-Quantum Cryptography Transition

open access: yesIEEE Access
The pace of quantum computing development necessitates not only the adoption of post-quantum cryptographic algorithms, but also the establishment of an executable and auditable institutional transition process.
Berat Birgin, Baris Celiktas
doaj   +1 more source

Retrofitting Post-Quantum Cryptography in Internet Protocols:A Case Study of DNSSEC [PDF]

open access: yes, 2020
Quantum computing is threatening current cryptography, especially the asymmetric algorithms used in many Internet protocols. More secure algorithms, colloquially referred to as Post-Quantum Cryptography (PQC), are under active development.
de Jong, Jins   +4 more
core   +3 more sources

Home - About - Disclaimer - Privacy