Results 51 to 60 of about 3,134 (166)

Privacy‐Aware Federated Recommender Systems for IoT Healthcare: A Review of Computational Methods, Multimodality, and Optimization for Real‐Time Personalization

open access: yesApplied Computational Intelligence and Soft Computing, Volume 2026, Issue 1, 2026.
The rapid increase in the number of internet of things (IoT) devices in the healthcare sector has produced an ecosystem of multimodal data that includes physiological signals, behavioral measurements, and electronic health records. Nevertheless, centralized analytics are dangerous to the privacy and safety of patient data.
Ravikumar R. N.   +4 more
wiley   +1 more source

Statistical Complexity of Quantum Learning

open access: yesAdvanced Quantum Technologies, Volume 8, Issue 12, December 2025.
The statistical performance of quantum learning is investigated as a function of the number of training data N$N$, and of the number of copies available for each quantum state in the training and testing data sets, respectively S$S$ and V$V$. Indeed, the biggest difference in quantum learning comes from the destructive nature of quantum measurements ...
Leonardo Banchi   +3 more
wiley   +1 more source

Post Quantum Cryptography on Healthcare Security: Safeguarding Patient Data in Medical Systems [PDF]

open access: yes
Quantum computers are capable of solving problems that classical computers cannot, particularly in the realm of cryptographic algorithms such as RSA, DSA, and ECC.
Kumar, Shubham
core   +2 more sources

Quantum-resistant Transport Layer Security [PDF]

open access: yes
The reliance on asymmetric public key cryptography (PKC) and symmetric encryption for cyber-security in current telecommunication networks is threatened by the emergence of powerful quantum computing technology.
Guilley, Sylvain   +6 more
core   +3 more sources

Quantum secure communication using hybrid post-quantum cryptography and quantum key distribution [PDF]

open access: yes
Once a cryptographically relevant quantum computer is built, confidential information that is communicated today can be decrypted and exposed. Key exchange methods currently used can then be broken and the key used to protect the data can be recovered ...
Aquina, Nick   +2 more
core   +2 more sources

Quantum Computing in Industrial Internet of Things (IIoT) Forensics: Framework, Implications, Opportunities, and Future Directions

open access: yesWIREs Forensic Science, Volume 7, Issue 3, September 2025.
Generic Quantum‐Safe IIoT Forensics Framework (QS‐IIoT‐F) ABSTRACT The continuous evolution of quantum computing has shown novel and transformative possibilities and critical implications for the Industrial Internet of Things (IIoT) forensic processes.
Victor R. Kebande
wiley   +1 more source

Hardware Security in the Connected World

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 15, Issue 3, September 2025.
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee   +4 more
wiley   +1 more source

Post-Quantum Migration of the Tor Application

open access: yesJournal of Cybersecurity and Privacy
The efficiency of Shor’s and Grover’s algorithms and the advancement of quantum computers implies that the cryptography used until now to protect one’s privacy is potentially vulnerable to retrospective decryption, also known as the harvest now, decrypt ...
Denis Berger   +2 more
doaj   +1 more source

Exploring the landscape of post quantum cryptography: a bibliometric analysis of emerging trends and research impact

open access: yesJournal of Big Data
With the emergence of quantum computers, classical cryptography is facing significant challenges. Address this compelling problem, it is the need of hour to develop Post Quantum cryptography (PQC), or quantum-resistant cryptography.
Taniya Hasija   +3 more
doaj   +1 more source

NIST Post-Quantum Cryptography Standards: A Comprehensive Review of Theoretical Foundations and Implementations

open access: yesIEEE Access
The transition to post-quantum cryptography (PQC) marks a pivotal shift in ensuring digital security, prompted by the potential of quantum computers to compromise classical systems such as Rivest-Shamir-Adlema and elliptic-curve cryptography. In response,
Quang Dang Truong   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy