Results 61 to 70 of about 3,650 (187)
Secure transmission in an unfriendly environment
This work investigates and show the performance of destination assisted node in ensuring secure communication in a dual-hop broadcast system. The information transmission occurs between the transmitters which are assumed to be equipped with single ...
Lukman A. Olawoyin +6 more
doaj +1 more source
Overview of Polkadot and its Design Considerations [PDF]
In this paper we describe the design components of the heterogenous multi-chain protocol Polkadot and explain how these components help Polkadot address some of the existing shortcomings of blockchain technologies. At present, a vast number of blockchain
Alper, Handan Kilinc +10 more
core +1 more source
Quantum Network Infrastructure
Quantum computing presents a threat to secure communication. Consequently, novel methods are investigated to address this global challenge, namely post quantum cryptography (PQC) and quantum key distribution (QKD). The image represents the distribution of a wavefunction over the entire world by using satellites in orbit.
Lisa Wörner +7 more
wiley +1 more source
Near-Optimal Modulo-and-Forward Scheme for the Untrusted Relay Channel
This paper studies an untrusted relay channel, in which the destination sends artificial noise simultaneously with the source sending a message to the relay, in order to protect the source's confidential message.
Fan, Lisheng +3 more
core +1 more source
Mixing Services in Bitcoin and Ethereum Ecosystems: A Review
This manuscript provides an in‐depth review of blockchain‐based mixing services, bridging the gap between academic research and real‐world applications. It examines core functionalities, operational mechanisms, and potential vulnerabilities, proposing an evaluation framework to assess these services.
Alireza Arbabi +2 more
wiley +1 more source
‘Software‐defined wide area networks (SD‐WAN) offer a modern solution to traditional network challenges by integrating advanced routing, enhanced security and quality service management. This paper presents innovative strategies to optimise SD‐WAN deployment, addressing security through IPsec encryption and zero trust frameworks, enhancing connectivity
Raied Ibrahim +3 more
wiley +1 more source
In the fast‐changing landscape of global mobility, the need for secure, efficient, and interoperable visa, passport, and immigration verification systems has never been higher. Traditional systems are inefficient, have security vulnerabilities, and exhibit poor interoperability.
Faraz Masood +3 more
wiley +1 more source
Secure communications with untrusted relays: a multi‐pair two‐way relaying approach
Physical‐layer security is usually ensured by the injection of artificial noise (AN) at the legitimate source or destination when relays are cooperative but untrusted. In this work, in order to avoid the power‐consuming AN at the legitimate user pairs, the authors investigate multi‐pair two‐way relaying as a solution for secure transmission in wireless
Tantan Zhao +3 more
openaire +1 more source
This study tackles the critical issue of securing data transmission from charging piles in vehicle‐to‐grid (V2G) systems, where false data injection attacks can compromise user privacy and system integrity. We propose a novel data aggregation scheme that combines group‐based anomaly detection with elliptic curve cryptography.
Nan Zhang +6 more
wiley +1 more source
Secure Transmission in SWIPT-Powered Two-Way Untrusted Relay Networks
In this paper, we investigate the secure transmission in two-way untrusted amplify-and-forward relay networks with simultaneous wireless information and power transfer (SWIPT).
Jiazhen Zhang +3 more
doaj +1 more source

