Results 61 to 70 of about 3,650 (187)

Secure transmission in an unfriendly environment

open access: yesICT Express, 2020
This work investigates and show the performance of destination assisted node in ensuring secure communication in a dual-hop broadcast system. The information transmission occurs between the transmitters which are assumed to be equipped with single ...
Lukman A. Olawoyin   +6 more
doaj   +1 more source

Overview of Polkadot and its Design Considerations [PDF]

open access: yes, 2020
In this paper we describe the design components of the heterogenous multi-chain protocol Polkadot and explain how these components help Polkadot address some of the existing shortcomings of blockchain technologies. At present, a vast number of blockchain
Alper, Handan Kilinc   +10 more
core   +1 more source

Quantum Network Infrastructure

open access: yesAdvanced Quantum Technologies, Volume 8, Issue 2, February 2025.
Quantum computing presents a threat to secure communication. Consequently, novel methods are investigated to address this global challenge, namely post quantum cryptography (PQC) and quantum key distribution (QKD). The image represents the distribution of a wavefunction over the entire world by using satellites in orbit.
Lisa Wörner   +7 more
wiley   +1 more source

Near-Optimal Modulo-and-Forward Scheme for the Untrusted Relay Channel

open access: yes, 2015
This paper studies an untrusted relay channel, in which the destination sends artificial noise simultaneously with the source sending a message to the relay, in order to protect the source's confidential message.
Fan, Lisheng   +3 more
core   +1 more source

Mixing Services in Bitcoin and Ethereum Ecosystems: A Review

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
This manuscript provides an in‐depth review of blockchain‐based mixing services, bridging the gap between academic research and real‐world applications. It examines core functionalities, operational mechanisms, and potential vulnerabilities, proposing an evaluation framework to assess these services.
Alireza Arbabi   +2 more
wiley   +1 more source

Comprehensive Strategies for Enhancing SD‐WAN: Integrating Security, Dynamic Routing and Quality of Service Management

open access: yesIET Networks, Volume 14, Issue 1, January/December 2025.
‘Software‐defined wide area networks (SD‐WAN) offer a modern solution to traditional network challenges by integrating advanced routing, enhanced security and quality service management. This paper presents innovative strategies to optimise SD‐WAN deployment, addressing security through IPsec encryption and zero trust frameworks, enhancing connectivity
Raied Ibrahim   +3 more
wiley   +1 more source

BLOCKVISA: A Blockchain‐Based System for Efficient and Secure Visa, Passport, and Immigration Verification

open access: yesIET Software, Volume 2025, Issue 1, 2025.
In the fast‐changing landscape of global mobility, the need for secure, efficient, and interoperable visa, passport, and immigration verification systems has never been higher. Traditional systems are inefficient, have security vulnerabilities, and exhibit poor interoperability.
Faraz Masood   +3 more
wiley   +1 more source

Secure communications with untrusted relays: a multi‐pair two‐way relaying approach

open access: yesIET Communications, 2018
Physical‐layer security is usually ensured by the injection of artificial noise (AN) at the legitimate source or destination when relays are cooperative but untrusted. In this work, in order to avoid the power‐consuming AN at the legitimate user pairs, the authors investigate multi‐pair two‐way relaying as a solution for secure transmission in wireless
Tantan Zhao   +3 more
openaire   +1 more source

A Secure Data Aggregation Scheme to Traceback Malicious Charging Piles for Large‐Scale V2G Data‐Sharing Scenarios

open access: yesIET Smart Grid, Volume 8, Issue 1, January/December 2025.
This study tackles the critical issue of securing data transmission from charging piles in vehicle‐to‐grid (V2G) systems, where false data injection attacks can compromise user privacy and system integrity. We propose a novel data aggregation scheme that combines group‐based anomaly detection with elliptic curve cryptography.
Nan Zhang   +6 more
wiley   +1 more source

Secure Transmission in SWIPT-Powered Two-Way Untrusted Relay Networks

open access: yesIEEE Access, 2018
In this paper, we investigate the secure transmission in two-way untrusted amplify-and-forward relay networks with simultaneous wireless information and power transfer (SWIPT).
Jiazhen Zhang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy