Results 61 to 70 of about 1,492,941 (204)

Generic Quantum Blockchain-Envisioned Security Framework for IoT Environment: Architecture, Security Benefits and Future Research

open access: yesIEEE Open Journal of the Computer Society
Quantum cryptography has the potential to secure the infrastructures that are vulnerable to various attacks, like classical attacks, including quantum-related attacks.
Mohammad Wazid   +2 more
doaj   +1 more source

Enhancing Extractable Quantum Entropy in Vacuum-Based Quantum Random Number Generator

open access: yesEntropy, 2018
Information-theoretically provable unique true random numbers, which cannot be correlated or controlled by an attacker, can be generated based on quantum measurement of vacuum state and universal-hashing randomness extraction.
Xiaomin Guo   +5 more
doaj   +1 more source

Quantum search for a given substring in the text using a hashing technique

open access: yesУчёные записки Казанского университета: Серия Физико-математические науки, 2020
The problem of searching for a given substring in the text was considered. It is known that classical algorithms solve this problem in a linear time depending on the length of the text and the specified template. Quantum algorithms speed up the search by
N.M. Salikhova
doaj   +1 more source

Blockchain and Quantum Technologies for Securing the Global Nuclear Supply Chain: Synergies, Applications, Technical Challenges and Opportunities

open access: yesJournal of Critical Infrastructure Policy, Volume 7, Issue 1, Spring/Summer 2026.
ABSTRACT The infiltration of counterfeit, fraudulent, and suspect items into civil nuclear supply chains, notably within power generation and medical isotope production, poses severe safety and security threats. The ever‐increasing growth in nuclear installations (70 power plants are under construction and another 100 are in the planning stage) and the
Hafiz Ahmed
wiley   +1 more source

Minimizing collisions for quantum hashing

open access: yesМатематические вопросы криптографии, 2016
Предлагаются явные алгоритмы вычисления параметров квантового хеширования, минимизирующих вероятность возникновения квантовых коллизий.
Vasiliev, A. V., Ziatdinov, M. T.
openaire   +2 more sources

Toward Integrative Predictive Toxicology: Advanced Methods for Drug Toxicity and Safety Prediction

open access: yesWIREs Computational Molecular Science, Volume 16, Issue 1, January/February 2026.
This figure summarizes the different methods in integrative predictive toxicology reviewed in this work, ranging from exploration of molecular mechanisms to in silico pharmacokinetic modeling and construction of adverse outcome pathway (AOP) networks based on key events (KEs) and key event relationships (KERs). Further integration with multi‐omics data
Eleonora Gianquinto   +6 more
wiley   +1 more source

Blockchain in Communication Networks: A Comprehensive Review

open access: yesIET Blockchain, Volume 6, Issue 1, January/December 2026.
This article provides a comprehensive review of blockchain applications in communication networks, focusing on domains such as IoT, 5G, vehicular systems, and decentralised trust infrastructures. It examines key challenges—including scalability, interoperability, and latency—and outlines future directions such as lightweight consensus protocols and AI ...
Quazi Mamun, Zhenni Pan, Jun Wu
wiley   +1 more source

Exploring Human Resource Managers' Perspectives on Blockchain Technology Adoption in the Automobile Industry: An Indian Study

open access: yesIET Blockchain, Volume 6, Issue 1, January/December 2026.
ABSTRACT This study presents human resource (HR) managers’ perceptions of blockchain adoption in India's automobile industry. An exploratory mixed‐method design consisting of qualitative and quantitative study was employed, involving 110 semi‐structured interviews with HR managers and their responses were used.
Priya Chanda   +4 more
wiley   +1 more source

Saturnin: a suite of lightweight symmetric algorithms for post-quantum security

open access: yesIACR Transactions on Symmetric Cryptology, 2020
The cryptographic algorithms needed to ensure the security of our communications have a cost. For devices with little computing power, whose number is expected to grow significantly with the spread of the Internet of Things (IoT), this cost can be a ...
Anne Canteaut   +6 more
doaj   +1 more source

A model of quantum communication device for quantum hashing

open access: yes, 2016
In this paper we consider a model of quantum communications between classical computers aided with quantum processors, connected by a classical and a quantum channel.
A. Vasiliev
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy