SA Latif, FBX Wen, C Iwendi, FW Li-Li… - Computer …, 2022 - Elsevier
Internet of things (IoT) is one of the most emerging technologies nowadays and it is one of the key enablers of industrial cyber physical system (CPSs). It has started to participate in …
As the number and characteristics of smart devices change, the concept of the Internet of Things (IoT) emerges. The IoT provides the connected devices with a variety of resources …
Distributed denial of service (DDoS) attacks pose an increasing threat to businesses and government agencies. They harm internet businesses, limit access to information and …
Cryptography is the mechanism of providing significant security services such as confidentiality, authentication, and integrity. These services are essentially more important in …
S Abbas, I Bouazzi, S Ojo, A Al Hejaili… - PeerJ Computer …, 2024 - peerj.com
Abstract The Internet of Things (IoT), considered an intriguing technology with substantial potential for tackling many societal concerns, has been developing into a significant …
Quantum communication is the most secure technique of transmitting data available today. Fiber communication lines and satellite-to-ground links have served as the basis for the …
The looming threat of quantum attacks on the digital infrastructure protected by conventional cryptographic protocol has generated urgency in identifying and deploying …
C Zhang, Y Liang, A Tavares, L Wang, T Gomes… - Symmetry, 2024 - mdpi.com
Due to its very desirable properties, Chebyshev polynomials are often used in the design of public key cryptographic systems. This paper discretizes the Chebyshev mapping …
K Sudharson, NS Usha, G Babu… - 2023 7th …, 2023 - ieeexplore.ieee.org
Data mining and quantum computing have become potent methods for analyzing massive datasets and gaining insightful conclusions. However, conventional techniques for data …