Results 61 to 70 of about 144,734 (270)

Residual vulnerabilities to power side channel attacks of lightweight ciphers cryptography competition finalists

open access: yesIET Computers & Digital Techniques, 2023
The protection of communications between Internet of Things (IoT) devices is of great concern because the information exchanged contains vital sensitive data.
Aurelien T. Mozipo, John M. Acken
doaj   +1 more source

Context-Awareness Enhances 5G Multi-Access Edge Computing Reliability [PDF]

open access: yes, 2019
The fifth generation (5G) mobile telecommunication network is expected to support Multi- Access Edge Computing (MEC), which intends to distribute computation tasks and services from the central cloud to the edge clouds.
Crippa, Marcos Rate   +4 more
core   +2 more sources

Engineering Binary Metal Oxide Nano‐Oscillators for Deterministic and Probabilistic Computing: From Material Physics to Emerging Paradigms

open access: yesAdvanced Physics Research, EarlyView.
This study demonstrates a versatile hardware platform using nano‐oscillators based on binary oxides for deterministic and probabilistic computing. By tailoring material physics, NbOx enables energy‐efficient synchronization for pattern recognition, while enhanced stochasticity in engineered SiOx provides robust entropy for p‐bits to solve complex ...
Jihyun Kim   +3 more
wiley   +1 more source

Research on Situation Awareness Model of Information Content Security Incidents in Telecommunication Network

open access: yesDianxin kexue, 2014
Aiming at the main features of the information content security incidents and telecommunication network themselves,a design of situation awareness model was presented.The model using distributed character data collection and hierarchical progressive ...
Lin Ge, Xinsheng Ji, Tao Jiang
doaj   +2 more sources

Subject: International [PDF]

open access: yes, 2006
Compiled by Susan LaCette.International.pdf: 820 downloads, before Oct.
LaCette, Susan
core   +1 more source

The Impact of Acquisition Intensity on ESG Performance

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT This study investigates the impact of Acquisition Intensity on ESG performance using a panel of 1,736 US‐listed companies from 2002 to 2023. Employing a robust OLS framework, we assess both Value‐Based and Volume‐Based Acquisition Intensity against overall ESG scores and their environmental, social, and governance pillars, controlling for firm
Ugbede Amedu   +2 more
wiley   +1 more source

Data security for third generation telecommunication systems [PDF]

open access: yes
This research work started as a humble, and yet ambitious attempt of enhancing the current security level in wireless data communication. Detailed analysis of the existing security protocols and wireless networks, together with their strengths and ...
Delivasilis, Dimitrios L.
core  

An evaluation of total quality management practices on business performance of the Nigerian telecommunications sector: a case study of MTN Nigeria Limited [PDF]

open access: yes, 2012
This study examines the effects of The Total Quality Management practices on Business Performance of the Nigerian Telecommunications Sector. A review of literatures on TQM shows that no study has been carried out on its application in the Nigerian ...
Alamutu, S. A   +3 more
core  

Exploring the Spillover Effect of Supply Chain Digitalisation on Pollution Emissions Through Social Network Analysis

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT The supply chain consists of interconnected businesses and organisations responsible for the flow of goods and services. As firms increasingly adopt digital technologies, the spillover effects of supply chain digitalisation (SCD) on environmental performance remain underexplored.
Zengdong Cao   +4 more
wiley   +1 more source

Eavesdropping near-field contactless payments: a quantitative analysis

open access: yesThe Journal of Engineering, 2013
This paper presents an assessment of how successful an eavesdropping attack on a contactless payment transaction can be in terms of bit and frame error rates, using an easily concealable antenna and low-cost electronics.
Thomas P. Diakos   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy