We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 2,638 results
  1. Optimal quantum key distribution networks: capacitance versus security

    The rate and security of quantum communications between users placed at arbitrary points of a quantum communication network depend on the structure...

    Lorenzo Cirigliano, Valentina Brosco, ... Laura Pilozzi in npj Quantum Information
    Article Open access 29 April 2024
  2. Face recognition approach for smart Internet of Things in home security system

    The primary issue in today's environment is home security. The conventional home security techniques are incredibly easy to breach and encourage...

    Yanfeng Fang, Yijiang Zhang in Journal of Optics
    Article 06 July 2023
  3. Advanced biometric system security: a novel hybrid approach integrating optical asymmetric PTFT and symmetric cipher techniques

    The rapidly evolving field of biometric recognition and verification technologies has seen substantial progress recently. However, the storage of...

    Fatma A. Hossam Eldein Mohamed, Walid El-Shafai, ... Moustafa H. Aly in Optical and Quantum Electronics
    Article 25 April 2024
  4. AI-enhanced security demand and routing management for MANETs with optical technologies

    The proliferation of Mobile Ad hoc Networks (MANETs), where nodes connect with one another to offer the required real-time entertainment services, is...

    Xuetao Jia, Donggui Huang, Na Qin in Optical and Quantum Electronics
    Article 21 December 2023
  5. Elastic optical network routing analysis using intelligent machine learning architecture with security analysis

    Allocating and routing resources in optical networks is an extremely important operation since it has a direct bearing on the efficiency and...

    Article 25 October 2023
  6. Cryptographic enhancement of image data security through quantum-classical hybrid encryption with parameterized pixel ratios

    To enhance the security of image data, this paper proposes a quantum-classical hybrid image encryption scheme based on parameterized pixel ratios....

    Lin Zeng, Yan Chang, ... Lili Yan in Quantum Information Processing
    Article 24 June 2024
  7. Radio optical network security analysis with routing in quantum computing for 5G wireless communication using blockchain machine learning model

    Rapid growth is also being seen in the deployment of optical network equipment and the development of new network services for next-generation...

    Fei Wang, Shasha Liao, ... Yichao Zhang in Optical and Quantum Electronics
    Article 13 September 2023
  8. Commissioning Tests of Tokamak JT-60SA (Chronicle)

    Abstract

    The authors of our journal repeatedly expressed concern about the large number of accidents (electrical breakdowns) occurring at electrical,...

    B. N. Kolbasov, D. P. Ivanov in Physics of Atomic Nuclei
    Article 01 December 2023
  9. Quantum communication based cyber security analysis using artificial intelligence with IoMT

    Connected electronic devices used in healthcare, such as small sensors and actuators and other cyber-physical devices, make up what is known as the...

    Huimin Han, Jun Yao, ... **gjuan Fu in Optical and Quantum Electronics
    Article 30 January 2024
  10. Toward Formalization of Software Security Issues

    Abstract

    CVE, CWE, and CAPEC databases and their relationships are shortly introduced. Focus on this paper is on formalization and more specific on...

    Article 06 June 2024
  11. Utilizing hybrid computing models for network monitoring and security analysis through optical network modeling and data analytics

    Safe and reliable data transport over optical networks is essential for a high-speed Internet. Optical fibres are the backbone of the Internet,...

    Sudhakar Reddy, Ajay Rastogi, ... Amrutha V. Nair in Optical and Quantum Electronics
    Article 14 December 2023
  12. Resource allocation with fuzzy logic based network optimization and security analysis in optical communication network

    Modern optical transport networks are extremely complicated systems that make managing and distributing management information accurate and...

    Hannah Jessie Rani, Rupal Gupta, ... Kodukula Subrahmanyam in Optical and Quantum Electronics
    Article 10 November 2023
  13. Design and evaluation of novel hybrid quantum resistant cryptographic system for enhancing security in wireless body sensor networks

    Data and information secrecy during storage or transmission has been preserved through the use of cryptography. Consequently, cryptography studies...

    Govindu Surla, R. Lakshmi in Optical and Quantum Electronics
    Article 01 November 2023
  14. Optical network modelling-based data analytics for network monitoring and security analysis using hybrid computing models

    With the ever-increasing complexity and scale of optical networks, efficient network monitoring and robust security analysis have become paramount....

    Fang Li, Yalou **e, Yong Han in Optical and Quantum Electronics
    Article 25 October 2023
  15. Security analysis of a chaotic encryption algorithm related to the sum of plaintext pixel value

    The security analysis of the existing chaotic image encryption algorithm is mainly for the algorithm whose secret keys are independent of plaintext,...

    Rong Zhou, Simin Yu, Qianxue Wang in Applied Physics B
    Article 16 May 2023
  16. Characterization of Laminated Composite Materials by Mechanical and Ultrasonic Tests

    Abstract

    Composite materials are used in various domains of the industry and research . In the way of exploring new resins that could be used in the...

    R. P. Lemanle Sanga, E. Siryabé, ... G. E. Ntamack in Mechanics of Solids
    Article 19 October 2023
  17. Practical quantum tokens without quantum memories and experimental tests

    Unforgeable quantum money tokens were the first invention of quantum information science, but remain technologically challenging as they require...

    Adrian Kent, David Lowndes, ... John Rarity in npj Quantum Information
    Article Open access 11 March 2022
  18. High-rate tests on resistive plate chambers operated with eco-friendly gas mixtures

    Results obtained by the RPC ECOgas@GIF++ Collaboration, using Resistive Plate Chambers operated with new, eco-friendly gas mixtures, based on...

    M. Abbrescia, G. Aielli, ... N. Zaganidis in The European Physical Journal C
    Article Open access 22 March 2024
  19. Security Modeling and Simulation

    Modeling and simulation (M&S) represent the structure and behavior of a system with a focus on what the system is and does to provide value-delivery....
    Keith D. Willett, Ivan Taylor in Handbook of Security Science
    Reference work entry 2022
  20. Security Modeling and Simulation

    Modeling and simulation (M&S) represent the structure and behavior of a system with a focus on what the system is and does to provide value-delivery....
    Keith D. Willett, Ivan Taylor in Handbook of Security Science
    Living reference work entry 2022
Did you find what you were looking for? Share feedback.