-
201
A Historical Survey of Sir Karl Popper's Contribution to Quantum Mechanics
Published 2012-11-01“… Sir Karl Popper (1902-1994), though not trained as a physicist and embarrassed early in his career by a physics error pointed out by Einstein and Bohr, ultimately made substantial contributions to the interpretation of quantum mechanics. …”
Get full text
Article -
202
A lightweight privacy-preserving truth discovery mechanism for IoT
Published 2021-05-01“…In order to solve diverse quality and privacy leakage of perceived data in fog-cloud integrated internet of things (IoT), a streaming encryption-based privacy-preserving truth discovery mechanism for IoT was proposed.Firstly, by utilizing shuffling and streaming encryption algorithms, the ground truths and the weights were anonymously updated on the cloud server and fog server, respectively, so that the collusion attacks between malicious attackers and cloud or fog servers could be resisted to defend against privacy leakage of IoT devices.Secondly, by adopting the Softmax function, the device weights were calculated on fog server, which reduces the error rate for calculating the ground truths.Finally, the theoretical analysis proved that the mechanism could protect privacy of the devices.And, the experimental results demonstrate that the proposed mechanism is an effective privacy-preserving trust discovery mechanism for large-scale IoT devices, which can outperform existing ones in computing efficiency.…”
Get full text
Article -
203
Quantum Diffie–Hellman key exchange
Published 2025-03-01“…Its security is analyzed in the framework of minimum-error-discrimination and photon-number-splitting attacks, while its performance and the challenges in a possible realization are also discussed.…”
Get full text
Article -
204
A Hyperchaotic Lorenz and DNA-Encoded Image Encryption Algorithm
Published 2024-01-01“…Meanwhile, the mean square error (MSE) of pepper and salt noise density is analyzed by the peak signal-to-noise ratio (PSNR). …”
Get full text
Article -
205
Physical Layer Cyber Resilience Oriented Dynamic Secure Polar Code
Published 2025-01-01“…The results show that the proposed scheme has high security against cryptanalysis attacks. Meanwhile the eavesdropper’s bit error rate is kept above 0.435 in non-degraded channel scenarios, and the reliability is almost the same with that of the original polar code. …”
Get full text
Article -
206
A new digital watermarking model using honey encryption and reversible cellular automata
Published 2025-07-01“…The results demonstrate that the proposed method significantly outperforms the compared methods in terms of imperceptibility, achieving a significantly lower mean squared error of 13.55 and mean absolute error of 3.05, and a higher peak signal-to-noise ratio of 36.89. …”
Get full text
Article -
207
Robust zero-watermarking for color images using hybrid deep learning models and encryption
Published 2025-08-01“…The extracted watermark maintains a low Bit Error Rate (BER) and a high Normalized Cross-Correlation (NCC). …”
Get full text
Article -
208
Use of Paraconsistent Feature Engineering to support the Long Term Feature choice for Speaker Verification
Published 2021-04-01“…Our experiments pointed out that for the use of more robust classifiers, the best choice would be the AlexNet method, while in terms of classification regarding the Equal Error Rate metric, the best suggestion would be Daubechies filter support 21. …”
Get full text
Article -
209
Security of School Financial Transaction Applications with the Implementation of Two Factor Authentication Method
Published 2025-05-01“…Financial transactions over the internet often become targets of cyber attacks that can harm users in conducting transactions due to negligence from both the system and human error. …”
Get full text
Article -
210
Heartbeat Biometrics for Remote Authentication Using Sensor Embedded Computing Devices
Published 2015-06-01“…The biometric verification method was tested with ECG records of 100 individuals and 1.34% of equal error rate (EER) was obtained. This feature could be computed and transmitted efficiently using mobile computing devices. …”
Get full text
Article -
211
A hybrid security protocol based on honey encryption and hyperchaotic systems for improving security in internet of things
Published 2025-05-01“…Also, in terms of security, this method has been able to improve the security of information, which has achieved values of 1.041 and 0.49, respectively, using the Mean Squared Error and Bit Error Ratio criteria.…”
Get full text
Article -
212
One-way Video Transmission Technology for Urban Rail Transit Based on EndpointDevices
Published 2025-07-01“…UPET (unidirectional private exchange tunnel) technology is employed for the design of one-way transmission channels, and FEC (forward error correction) technology is used for error correction and verification design. …”
Get full text
Article -
213
Certificateless multi-source signcryption with lattice
Published 2022-11-01“…Based on learning with errors and inhomogeneous small integer solution problems, LCL-MSSC is unforgeable under the adaptive chosen-message attacks and indistinguishable under the adaptive chosen-ciphertext attacks; in addition, it can resist the pollution attacks and quantum computing attacks. …”
Get full text
Article -
214
Analysis on Aigis‐Enc: Asymmetrical and symmetrical
Published 2021-03-01“…Abstract Aigis‐Enc is an encryption algorithm based on asymmetrical learning with errors (LWE). A thorough comparison between Aigis‐Enc (with the recommended parameters) and a symmetrical LWE encryption scheme on the same scale (the sampling parameters are {η1, η2} = {2, 2} instead of {1, 4}) on Chosen‐plaintext attack (CPA) security, computation complexity and decryption failure probability is made. …”
Get full text
Article -
215
Maritime autonomous surface ships (MASS) in Gulf of Suez: safety of navigation precautionary measures
Published 2023-01-01“…Maritime Autonomous Surface Ships (MASS) improvements may help eliminate human error and greatly increase overall safety, but they are also likely to pose new threats, particularly given the marine industry's growing interest in MASS. …”
Get full text
Article -
216
Consensus of networked control multi-agent systems using a double-layer encryption scheme
Published 2023-11-01“…The paper provides an explicit design, supported by theoretical proof and numerical verification, covering stability, steady-state error, and the prevention of computation overflow or underflow.…”
Get full text
Article -
217
Real-Time Threat Mitigation in Financial IT Infrastructures Using Quantum Computing
Published 2025-06-01“…However, practical implementation of quantum computing solutions faces challenges such as high error rates, environmental sensitivity, and integration complexities. …”
Get full text
Article -
218
Blast loading prediction in a typical urban environment based on Bayesian deep learning
Published 2025-12-01“…Explosion events in urban environment, such as terrorist attacks, accidental industrial explosions and missile attacks in war, can be destructive to residents and properties, causing great casualties and structural damages. …”
Get full text
Article -
219
3D Radio Map-Based GPS Spoofing Detection and Mitigation for Cellular-Connected UAVs
Published 2023-01-01“…Furthermore, the particle text filter-based GPS spoofing mitigation can relocate the UAV to the real position within an error of 10 meters using 100 particles.…”
Get full text
Article -
220
Cancelable finger vein authentication using multidimensional scaling based on deep learning
Published 2025-06-01“…We evaluated our system on three publicly available datasets for finger veins using various performance metrics, including accuracy, precision, recall, and equal error rate (EER). The results demonstrated the effectiveness of our method, which achieved high accuracy, low error rates, and strong performance in diversity and irreversibility tests. …”
Get full text
Article