Results 61 to 70 of about 1,492,941 (204)
Quantum cryptography has the potential to secure the infrastructures that are vulnerable to various attacks, like classical attacks, including quantum-related attacks.
Mohammad Wazid +2 more
doaj +1 more source
Enhancing Extractable Quantum Entropy in Vacuum-Based Quantum Random Number Generator
Information-theoretically provable unique true random numbers, which cannot be correlated or controlled by an attacker, can be generated based on quantum measurement of vacuum state and universal-hashing randomness extraction.
Xiaomin Guo +5 more
doaj +1 more source
Quantum search for a given substring in the text using a hashing technique
The problem of searching for a given substring in the text was considered. It is known that classical algorithms solve this problem in a linear time depending on the length of the text and the specified template. Quantum algorithms speed up the search by
N.M. Salikhova
doaj +1 more source
ABSTRACT The infiltration of counterfeit, fraudulent, and suspect items into civil nuclear supply chains, notably within power generation and medical isotope production, poses severe safety and security threats. The ever‐increasing growth in nuclear installations (70 power plants are under construction and another 100 are in the planning stage) and the
Hafiz Ahmed
wiley +1 more source
Minimizing collisions for quantum hashing
Предлагаются явные алгоритмы вычисления параметров квантового хеширования, минимизирующих вероятность возникновения квантовых коллизий.
Vasiliev, A. V., Ziatdinov, M. T.
openaire +2 more sources
Toward Integrative Predictive Toxicology: Advanced Methods for Drug Toxicity and Safety Prediction
This figure summarizes the different methods in integrative predictive toxicology reviewed in this work, ranging from exploration of molecular mechanisms to in silico pharmacokinetic modeling and construction of adverse outcome pathway (AOP) networks based on key events (KEs) and key event relationships (KERs). Further integration with multi‐omics data
Eleonora Gianquinto +6 more
wiley +1 more source
Blockchain in Communication Networks: A Comprehensive Review
This article provides a comprehensive review of blockchain applications in communication networks, focusing on domains such as IoT, 5G, vehicular systems, and decentralised trust infrastructures. It examines key challenges—including scalability, interoperability, and latency—and outlines future directions such as lightweight consensus protocols and AI ...
Quazi Mamun, Zhenni Pan, Jun Wu
wiley +1 more source
ABSTRACT This study presents human resource (HR) managers’ perceptions of blockchain adoption in India's automobile industry. An exploratory mixed‐method design consisting of qualitative and quantitative study was employed, involving 110 semi‐structured interviews with HR managers and their responses were used.
Priya Chanda +4 more
wiley +1 more source
Saturnin: a suite of lightweight symmetric algorithms for post-quantum security
The cryptographic algorithms needed to ensure the security of our communications have a cost. For devices with little computing power, whose number is expected to grow significantly with the spread of the Internet of Things (IoT), this cost can be a ...
Anne Canteaut +6 more
doaj +1 more source
A model of quantum communication device for quantum hashing
In this paper we consider a model of quantum communications between classical computers aided with quantum processors, connected by a classical and a quantum channel.
A. Vasiliev
semanticscholar +1 more source

