过去一年中添加的文章,按日期排序

[引用][C] Special Issue on “Ensuring security for artificial intelligence applications in mobile edge computing software systems”

L Qi, VS Sheng, X Xu, J Chen - Software: Practice and Experience - Wiley Online Library
6 天前 - … and questionnaire-based survey to explore the challenging factors of … uses an
access control strategy and smart contracts based on ciphertext policy attribute-based encryption

Advancing network security paradigms integrating quantum computing models for enhanced protections

AS Rajawat, SB Goyal, C Verma… - … Data Science and Smart …, 2025 - taylorfrancis.com
6 天前 - … has introduced possible flaws to traditional encryption systems that were pre… study
explores the incorporation of quantum computing models into the domain of network security, …

[PDF][PDF] Stacked Classification Model with Cryptographic Process in IoT Data to Prevent and Detect Attacks

N Shashikala, TN Anitha, P Mishra, RP Herakal, J Kolur - 2024 - ijsret.com
8 天前 - … in technologies like edge computing and blockchain are being explored to enhance
security by enabling data … In essence, cryptography forms the backbone of IoT data security, …

Exploration of Quantum Cryptography Security Applications for Industrial Control Systems

H Li, Y Dong, Y Zhang, H Wang - Applied Mathematics and Nonlinear … - sciendo.com
9 天前 - … makes the intrusion response in the information security protection of industrial
control systems, there are still many problems that need to be further explored and researched. …

Research in the field of quantum-safe cryptography

ТС Берестяна - Сучасний захист інформації, 2024 - journals.dut.edu.ua
10 天前 - … of quantum-secure cryptography, revealing their potential to improve information
security in … In conclusion to the research, I have explored a wide range of aspects related to this …

Hybrid energy efficient deep learning and redactable consortium blockchain-based secure framework for smart parking in smart cities

S Baskaran - Multimedia Tools and Applications, 2024 - Springer
19 天前 - … related to the parking zones to establish secure … Bi-LSTM Networks in the analysis
layer for exploring the cloud data that … It uses TCH algorithm for performing encryption and …

Artificial intelligence, machine learning, deep learning, and blockchain in financial and banking services: a comprehensive review

M Paramesha, N Rane, J Rane - Available at SSRN 4855893, 2024 - papers.ssrn.com
28 天前 - … of new technologies such as quantum computing in … , risk management, and
cryptography. The research contributes … uses, and proposing new research paths for exploring AI's …

Application Layer Security For Cloud

R Patel, A Goswami, HK Mistry, C Mavani - … Administration: Theory and …, 2024 - kuey.net
28 天前 - explores the various security techniques that can be used to protect an organization's
cloud computing applicationsencryption and blockchain, into cloud computing to enhance …

Future-proofing genomic data and consent management: a comprehensive review of technology innovations

A Oliva, A Kaphle, R Reguant, LMF Sng… - …, 2024 - academic.oup.com
28 天前 - … in cloud computing, quantum-computing-proof encryption, and self-… We explore
both proven and emerging solutions and … There is growing concern among information security

Leveraging Quantum Technology to Enhance Community Services and Supportive ICT Infrastructure

F Phillipson - International Conference on Innovations for Community …, 2024 - Springer
33 天前 - … This article explores the transformative potential of quantum technology in community
… Quantum cryptography can also secure communication networks used by emergency …