Results 111 to 120 of about 37,820 (242)

6G Wireless Communications Enabled by the Blockchain: Privacy and Middleware Architecture

open access: yesInternational Journal of Distributed Sensor Networks, Volume 2026, Issue 1, 2026.
6G is transformational and brings revolutionary innovations in virtually all sectors, such as healthcare, autonomous systems, and manufacturing, through ultralow latency, massive connection, and far superior computing capabilities than any previous generation.
Moumita Chanda   +4 more
wiley   +1 more source

Parameter Sensitivity Test and Audio Encryption Scheme Design for Multimedia Information Security

open access: yesInternational Journal of Digital Multimedia Broadcasting, Volume 2026, Issue 1, 2026.
With the continuous development of information technology, multimedia information faces many security threats. To realize efficient multimedia information processing under the premise of guaranteeing information security, this research analyzes and extracts the parameters of different kinds of information in view of the fact that each of them has ...
Ming Yin, Shi Tang, Deepali
wiley   +1 more source

Mathematical Foundations and Implementation of CONIKS Key Transparency

open access: yesApplied Sciences
This research paper explores the CONIKS key management system’s security and efficiency, a system designed to ensure transparency and privacy in cryptographic operations.
Elissa Mollakuqe   +2 more
doaj   +1 more source

A Secure and Robust Blockchain‐Based Medical Image Encryption Approach Using Lorenz Chaotic System

open access: yesJournal of Sensors, Volume 2026, Issue 1, 2026.
Keeping medical images confidential while transmitting is crucial, especially in an open networking environment. One effective approach is blockchain‐based encryption, which provides strong security for sensitive healthcare data. To ensure the greatest levels of medical data integrity and authenticity, our proposed scheme employs a unique Lorenz ...
Fahima Hajjej   +4 more
wiley   +1 more source

Implementation of a Data-Parallel Approach on a Lightweight Hash Function for IoT Devices

open access: yesMathematics
The Internet of Things is used in many application areas in our daily lives. Ensuring the security of valuable data transmitted over the Internet is a crucial challenge.
Abdullah Sevin
doaj   +1 more source

Comprehensive Analysis of Cryptographic Algorithms: Implementation and Security Insights

open access: yesEngineering Proceedings
This study surveys some cryptographic algorithms in a detailed manner; it mainly focuses on symmetric key cryptography and asymmetric key cryptography with hash functions following them.
Rashid Muhenga   +4 more
doaj   +1 more source

Tightly-Secure Two-Tier Signatures on Code-Based Digital Signatures with Chameleon Hash Functions

open access: yesMathematics
In the current landscape where quantum algorithms pose a significant threat to conventional digital signature algorithms, code-based digital signature algorithms have emerged as the primary focus of ongoing research in post-quantum cryptography.
Yong Wang, Eddie Shahril Ismail
doaj   +1 more source

5G-MobiCare: A Secure 5G Assisted Remote Mobile Health Monitoring Platform

open access: yesIEEE Access
E-Healthcare utilizes IoT-enabled medical devices equipped with sensors to gather and transmit patient health data to a centralized electronic health record (EHR) system via mobile networks, enabling remote health management.
Hemangi Goswami   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy