Results 61 to 70 of about 3,690 (182)

On Security and Throughput for Energy Harvesting Untrusted Relays in IoT Systems Using NOMA

open access: yesIEEE Access, 2019
In this paper, we analyze the secrecy and throughput of multiple-input single-output (MISO) energy harvesting (EH) Internet of Things (IoT) systems, in which a multi-antenna base station (BS) transmits signals to IoT devices (IoTDs) with the help of ...
Van Nhan Vo   +6 more
doaj   +1 more source

Device‐Independent Quantum Key Distribution: Protocols, Quantum Games and Security

open access: yesIET Quantum Communication, Volume 7, Issue 1, January/December 2026.
Device‐independent quantum key distribution (DIQKD) removes the need to trust internal device behaviour by certifying security through Bell‐inequality violations, thereby closing practical loopholes in conventional QKD. This paper systematically reviews DIQKD foundations (Bell tests and security definitions), protocol frameworks (CHSH‐based and ...
Syed M. Arslan   +3 more
wiley   +1 more source

Proposal for Implementing Device-Independent Quantum Key Distribution based on a Heralded Qubit Amplification

open access: yes, 2010
In device-independent quantum key distribution (DIQKD), the violation of a Bell inequality is exploited to establish a shared key that is secure independently of the internal workings of the QKD devices.
Gisin, Nicolas   +2 more
core   +2 more sources

Weak Secrecy in the Multiway Untrusted Relay Channel With Compute-and-Forward [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2015
We investigate the problem of secure communications in a Gaussian multi-way relay channel applying the compute-and-forward scheme using nested lattice codes. All nodes employ half-duplex operation and can exchange confidential messages only via an untrusted relay. The relay is assumed to be honest but curious, i.e., an eavesdropper that conforms to the
Johannes Richter   +3 more
openaire   +2 more sources

Intelligent Sky Computing: A DDPG‐Based Joint Optimization Scheme for Privacy‐Aware Task Offloading in Multi‐UAV Networks

open access: yesInternational Journal of Distributed Sensor Networks, Volume 2026, Issue 1, 2026.
Exploiting privacy‐aware user task offloading in a multi‐UAV–assisted edge computing system offers a new approach to reduce and balance energy consumption and latency. However, the complexity and variability of operating scenarios can make privacy‐aware user task offloading strategies challenging. This paper examines a system with multiple ground users,
Ke Jiang   +7 more
wiley   +1 more source

Secure transmission in an unfriendly environment

open access: yesICT Express, 2020
This work investigates and show the performance of destination assisted node in ensuring secure communication in a dual-hop broadcast system. The information transmission occurs between the transmitters which are assumed to be equipped with single ...
Lukman A. Olawoyin   +6 more
doaj   +1 more source

A Review of the Internet of Things (IoT) Landscape: Technologies, Applications, and Open Challenges

open access: yesJournal of Electrical and Computer Engineering, Volume 2026, Issue 1, 2026.
The Internet of Things (IoT) has emerged as a large‐scale ecosystem that integrates sensing, communication, and computation across diverse application domains. Its deployment spans smart homes, wearable devices, industrial automation, and smart cities, where heterogeneous devices are required to operate under strict performance, reliability, and ...
Sidna Jeddou   +5 more
wiley   +1 more source

Enhancing Physical Layer Security in AF Relay Assisted Multi-Carrier Wireless Transmission

open access: yes, 2018
In this paper, we study the physical layer security (PLS) problem in the dual hop orthogonal frequency division multiplexing (OFDM) based wireless communication system.
Ali, Zain   +3 more
core   +1 more source

Bridging the Gap: Achieving Seamless Interoperability Between Ethereum‐Based Blockchains Using Inter‐Blockchain Communication Protocols

open access: yesSoftware: Practice and Experience, Volume 55, Issue 11, Page 1749-1772, November 2025.
ABSTRACT Introduction The popularization of blockchain‐based applications made evident a critical challenge, namely the inherent isolation of these decentralized systems, akin to the disconnected and technologically diverse local area networks of the 1970s. This lack of interoperability limits the potential for widespread adoption and innovation in the
Christian Delgado‐von‐Eitzen   +3 more
wiley   +1 more source

Dynamic Continuous Variable Quantum Key Distribution for Securing a Future Global Quantum Network

open access: yesAdvanced Quantum Technologies, Volume 8, Issue 10, October 2025.
The article explores securing a dynamic global quantum network using continuous variable QKD, proposing a unified three‐layer network architecture for integrating existing QKD networks. It evaluates secret key rates across various channels and introduces the link capacity as a metric for determining the optimum path for secret key distribution in a ...
Mikhael T. Sayat   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy