|
|
|
Mamoon Riaz, Hammad Dilpazir, Sundus Naseer, Hasan Mahmood, Asim Anwar, Junaid Khan, Ian B. Benitez and Tanveer Ahmad
In the past few decades, the transmission of data over an unsecure channel has resulted in an increased rate of hacking. The requirement to make multimedia data more secure is increasing day by day. Numerous algorithms have been developed to improve effi...
ver más
|
|
|
|
|
|
|
Shuai Zhang, Heng Wang, Yan Pan, Yun Shao, Tao Zhang, Wei Huang, Yang Li and Bingjie Xu
Dual-polarization division multiplexing (DPDM) is considered to be a potential method to boost the secure key rate (SKR) of the continuous-variable quantum key distribution (CV-QKD) system. In this article, we propose a pilot alternately assisted local l...
ver más
|
|
|
|
|
|
|
Asad Iqbal, Muhammad Zubair, Muhammad Asghar Khan, Insaf Ullah, Ghani Ur-Rehman, Alexey V. Shvetsov and Fazal Noor
Vehicular ad hoc networks (VANETs) have become an essential part of the intelligent transportation system because they provide secure communication among vehicles, enhance vehicle safety, and improve the driving experience. However, due to the openness a...
ver más
|
|
|
|
|
|
|
Hyounhee Koo, Changho Ryoo and Wooseong Kim
The growing significance of ubiquitous 6G connectivity within the maritime sector is a consequence of its evolution into an era characterized by the adoption of autonomous ships. This evolution necessitates the development of adaptable communication capa...
ver más
|
|
|
|
|
|
|
Abdullah As Sami, Saadman Sakib, Kaushik Deb and Iqbal H. Sarker
Deep learning has enabled a straightforward, convenient method of road pavement infrastructure management that facilitates a secure, cost-effective, and efficient transportation network. Manual road pavement inspection is time-consuming and dangerous, ma...
ver más
|
|
|
|
|
|
|
Qihong Yu, Jiguo Li and Sai Ji
In the past 10 years, many side-channel attacks have been discovered and exploited one after another by attackers, which have greatly damaged the security of cryptographic systems. Since no existing anonymous broadcast encryption scheme can resist the si...
ver más
|
|
|
|
|
|
|
Ronaldo Serrano, Ckristian Duran, Marco Sarmiento, Tuan-Kiet Dang, Trong-Thuc Hoang and Cong-Kha Pham
Hardware acceleration of cryptography algorithms represents an emerging approach to obtain benefits in terms of speed and side-channel resistance compared to software implementations. In addition, a hardware implementation can provide the possibility of ...
ver más
|
|
|
|
|
|
|
Febby Ronaldo, Amang Sudarsono, Dadet Pramadihanto
Pág. 120 - 135
Drone technology is considered the most effective solution for the improvement of various industrial fields. As a delivery service, drones need a secure communication system that is also able to manage all of the information data in real-time. Howe...
ver más
|
|
|
|
|
|
|
Mohsin Murad, Imran A. Tasadduq and Pablo Otero
We propose an effective, low complexity and multifaceted scheme for peak-to-average power ratio (PAPR) reduction in the orthogonal frequency division multiplexing (OFDM) system for underwater acoustic (UWA) channels. In UWA OFDM systems, PAPR reduction i...
ver más
|
|
|
|
|
|
|
Abdullah M. Almuhaideb and Huda A. Alghamdi
The Telecare Medical Information System (TMIS) is a technology used in Wireless Body Area Networks (WBAN) that is used efficiently for remote healthcare services. TMIS services can be provided as cloud computing services for storage and processing purpos...
ver más
|
|
|
|