Results 41 to 50 of about 3,134 (166)

Cybersecurity Driven Quantum Digital Twin for Proactive Threat Reversal in Open RAN

open access: yesIET Quantum Communication, Volume 7, Issue 1, January/December 2026.
This paper presents a novel cybersecurity‐driven quantum digital twin (CQDT) architecture for proactive defence in 6G Open RAN. By integrating quantum observables and reinforcement learning, the framework maintains high fidelity and suppresses entropy under adversarial CPTP noise. CQDT achieves real‐time adaptation with sub‐20 ms latency, meeting URLLC
Yassir Al‐Karawi   +2 more
wiley   +1 more source

Signature Split Method for a PQC-DSA Compliant with V2V Communication Standards

open access: yesApplied Sciences, 2023
The development of quantum computing systems poses a great threat to the security of existing public key-based systems. As a result, the National Institute of Standards and Technology (NIST) started a Post-Quantum Cryptography (PQC) standardization ...
Youngbeom Kim, Seog Chung Seo
doaj   +1 more source

Resisting Quantum Key Distribution Attacks Using Quantum Machine Learning

open access: yesIET Quantum Communication, Volume 7, Issue 1, January/December 2026.
Quantum key distribution (QKD) promises secure communication but remains vulnerable to advanced quantum attacks. We propose a hybrid quantum long short‐term memory (QLSTM) model that combines quantum‐enhanced learning with classical deep learning to detect attacks such as photon‐number splitting, Trojan‐Horse and detector blinding.
Ali Al‐Kuwari   +4 more
wiley   +1 more source

Systematic review on securing IoT systems with post quantum cryptography emerging threats, countermeasures, and future research needs

open access: yesDiscover Internet of Things
The rapid deployment of Internet of Things (IoT) devices across critical infrastructure’s sectors such as healthcare, transportation, and smart cities brings unprecedented security challenges; particularly as quantum computing threatens the classical ...
Ketema Adere   +11 more
doaj   +1 more source

Towards a Secure Central Bank Digital Currency System: A Case Study of Tanzania

open access: yesThe Journal of Engineering, Volume 2026, Issue 1, January/December 2026.
This study proposes a secure, context‐specific design for a Central Bank Digital Currency (CBDC) system for Tanzania, grounded in stakeholder input and empirical data. It identifies key adoption barriers in digital financial services, namely, security and privacy concerns and high transaction fees, and suggests how a well‐designed CBDC might address ...
Godbless Gibson Minja   +2 more
wiley   +1 more source

Quantum‐Resistant Security in Digital Twin Healthcare Systems

open access: yesIET Wireless Sensor Systems, Volume 16, Issue 1, January/December 2026.
Quantum‐safe architecture for secure healthcare data transmission integrating QKD, edge devices, and cloud‐based Digital Twin analytics. ABSTRACT The development of digital twin (DT) systems for healthcare presents several challenges, particularly in ensuring data protection and communication security in real‐time environments.
Ahmed K. Jameil, Hamed Al‐Raweshidy
wiley   +1 more source

When classical encryption fails: A non-invasive post-quantum security layer for medical image transfers

open access: yesInformatics in Medicine Unlocked
Quantum computing threatens the long-term security of widely deployed public-key cryptography used to protect medical image transfer. The Digital Imaging and Communications in Medicine (DICOM) standard is the dominant format and protocol suite for ...
Nino Ricchizzi   +3 more
doaj   +1 more source

Joint QKD-Post-Quantum Cryptosystems

open access: yesIEEE Access, 2020
To extend the transmission distance and/or improve secret-key rate of QKD protocols, we propose to employ the joint QKD-post-quantum cryptosystems in which QKD is used for raw-key transmission while the post-quantum cryptography (PQC) subsystem to ...
Ivan B. Djordjevic
doaj   +1 more source

Comparative Analysis of Classical and Post-Quantum Cryptographic Methods for Secure Digital Signature Implementation in the Quantum Era [PDF]

open access: yes
Rapid improvements in quantum computing have posed substantial hurdles to conventional cryptography systems, which depend on the computational intractability of resolving intricate mathematical issues.
Putra, Rayasa Puringgar Prasadha   +2 more
core   +2 more sources

Human and Technical Factors in the Adoption of Quantum Cryptographic Algorithms [PDF]

open access: yes, 2023
The purpose of this research is to understand what factors would cause users to choose quantum key distribution (QKD) over other methods of cryptography.
Pinkston, Alyssa
core   +1 more source

Home - About - Disclaimer - Privacy