Academic literature on the topic 'Secure Networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secure Networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Secure Networks"

1

Elaine Shi and A. Perrig. "Designing Secure Sensor Networks." IEEE Wireless Communications 11, no. 6 (2004): 38–43. http://dx.doi.org/10.1109/mwc.2004.1368895.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhan, Justin. "Secure Collaborative Social Networks." IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 40, no. 6 (2010): 682–89. http://dx.doi.org/10.1109/tsmcc.2010.2050879.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Breeding, Marshall. "Designing secure library networks." Library Hi Tech 15, no. 1/2 (1997): 11–20. http://dx.doi.org/10.1108/07378839710306945.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kotzanikolaou, Panayiotis, Roza Mavropodi, Christos Douligeris, and Vassilios Chrissikopoulos. "Secure distributed intelligent networks." Computer Communications 29, no. 3 (2006): 325–36. http://dx.doi.org/10.1016/j.comcom.2004.12.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Maivizhi, Radhakrishnan, and Palanichamy Yogesh. "Secure In-Network Aggregation in Wireless Sensor Networks." International Journal of Intelligent Information Technologies 16, no. 1 (2020): 49–74. http://dx.doi.org/10.4018/ijiit.2020010104.

Full text
Abstract:
In-network aggregation is a natural approach in wireless sensor networks (WSNs) to collaboratively process data generated by the sensor nodes. Besides processing, in-network aggregation also achieves effective energy consumption and bandwidth utilization. Since the sensing devices of a WSN are prone to a variety of attacks due to wireless communication and limited resources, secure in-network aggregation is a great challenge. This article proposes a secure in-network aggregation (SINA) protocol for additive aggregation functions. This protocol integrates privacy homomorphism (PH) and secret sh
APA, Harvard, Vancouver, ISO, and other styles
6

Shang, Tao, Jiao Li, and Jian-wei Liu. "Secure quantum network coding for controlled repeater networks." Quantum Information Processing 15, no. 7 (2016): 2937–53. http://dx.doi.org/10.1007/s11128-016-1323-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tamaddon, Sohail, Atif Ahmad, and Rachelle Bosua. "Secure Knowledge Management." International Journal of Cyber Warfare and Terrorism 5, no. 2 (2015): 1–20. http://dx.doi.org/10.4018/ijcwt.2015040101.

Full text
Abstract:
Human knowledge-sharing networks generate Intellectual Property and Trade Secrets that provide private enterprise with competitive advantages. Although considerable research has focused on increasing the knowledge-sharing outcomes of such networks, there has been comparatively less emphasis on examining the possibility of competitive erosion through knowledge leakage. This paper considers how to mitigate knowledge leakage by influencing the development of human knowledge sharing networks. The authors review the literatures of human knowledge sharing networks as well as information security man
APA, Harvard, Vancouver, ISO, and other styles
8

von Solms, Basie, and Emil Marais. "From secure wired networks to secure wireless networks – what are the extra risks?" Computers & Security 23, no. 8 (2004): 633–37. http://dx.doi.org/10.1016/j.cose.2004.09.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Al-Fayyadh, Hayder. "ENHANCING QUALITY OF SERVICE IN MANET ENVIRONMENTS WITH CRYPTOGRAPHIC SECURE MECHANISMS TO SECURE SUSTAINABLE SMART CITIES." Journal of Engineering, Management and Information Technology 2, no. 4 (2024): 169–76. http://dx.doi.org/10.61552/jemit.2024.04.001.

Full text
Abstract:
The utilization of wireless sensor networks to gather, process, and act upon data may be a powerful tool in the development of a city-wide communication network that can accommodate many applications, ultimately leading to smart city solutions. Several challenges might be encountered by a smart city network. These include the need to adapt the network's coverage area to suit various applications, uneven distribution of nodes, a rise in message volume, the use of several communication technologies, and heterogeneity in both nodes and messages. There are many different facets of smart cities tha
APA, Harvard, Vancouver, ISO, and other styles
10

Sadineni, Mr Giribabu, Janardhan Reddy D, B. Uma Pavani, K. Vijaya Lakshmi, Sk Karishma, and P. Tulasi. "Secure Aggregation of Data in Connection-Less Networks." International Journal of Innovative Research in Computer Science and Technology 11, no. 3 (2023): 85–89. http://dx.doi.org/10.55524/ijircst.2023.11.3.16.

Full text
Abstract:
Reliable Minimal Energy Cost Routing (RMECR) and Reliable Minimum Energy Routing are two ingenious dynamism- conscious routing algorithms for wireless ad hoc networks (RMER). Ad hoc network conditions for dynamism effectiveness, responsibility, and dragging network continuance are all managed by RMECR. To develop dynamism-effective and reliable pathways that outstretch the network's functional continuance, it takes into account the bumps' dynamism operation, their remaining battery dynamism, and the tractability of their links. RMER, on the other phase, is a dynamism-effective routing algorith
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Secure Networks"

1

Tan, Hailun Computer Science &amp Engineering Faculty of Engineering UNSW. "Secure network programming in wireless sensor networks." Awarded By:University of New South Wales. Computer Science & Engineering, 2010. http://handle.unsw.edu.au/1959.4/44835.

Full text
Abstract:
Network programming is one of the most important applications in Wireless Sensor Networks as It provides an efficient way to update program Images running on sensor nodes without physical access to them. Securing these updates, however, remains a challenging and important issue, given the open deployment environment of sensor nodes. Though several security schemes have been proposed to impose the authenticity and Integrity protection on network programming applications, they are either energy Inefficient as they tend to use digital signature or lacks the data confidentiality. In addition, due
APA, Harvard, Vancouver, ISO, and other styles
2

Yiu, Wai-Pun. "Secure overlay multicast /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?COMP%202004%20YIU.

Full text
Abstract:
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2004.<br>Includes bibliographical references (leaves 71-77). Also available in electronic version. Access restricted to campus users.
APA, Harvard, Vancouver, ISO, and other styles
3

Paul, Greig. "Secure decentralised storage networks." Thesis, University of Strathclyde, 2017. http://digitool.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=28763.

Full text
Abstract:
In recent years, cloud-based computing and storage have become increasingly popular,as they remove the need for users and developers to buy or rent expensive dedicated hardware on an ongoing basis. This has led to the increasing centralisation of both services and storage, where users are reliant upon a small number of cloud-based providers to hold their data, and provide them with services they use. Recent events have shown that security breaches of centralised data stores can lead to significant quantities of personal data being revealed. This centralisation can also result in inconvenience
APA, Harvard, Vancouver, ISO, and other styles
4

Hia, Henry Erik. "Secure SNMP-Based Network Management in Low Bandwidth Networks." Thesis, Virginia Tech, 2001. http://hdl.handle.net/10919/32126.

Full text
Abstract:
This research focuses on developing a secure, SNMP-based network management system specifically tailored for deployment in internetworks that rely on low-bandwidth backbone networks. The network management system developed uses a two-level hierarchy of network management applications consisting of one top-level management application communicating with several mid-level management applications strategically distributed throughout the internetwork. Mid-level management applications conduct routine monitoring chores on behalf of the top-level management application and report results in a way
APA, Harvard, Vancouver, ISO, and other styles
5

Lim, Yu-Xi. "Secure Geolocation for Wireless Indoor Networks." Thesis, Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11454.

Full text
Abstract:
The objective of the research is to develop an accurate system for indoor location estimation using a secure architecture based on the IEEE 802.11 standard for infrastructure networks. Elements of this secure architecture include: server-oriented platform for greater trust and manageability; multiple wireless network parameters for improved accuracy; and Support Vector Regression (SVR) for accurate, high-resolution estimates. While these elements have been investigated individually in earlier research, none has combined them to a single security-oriented system. Thus this research investigates
APA, Harvard, Vancouver, ISO, and other styles
6

Bellardo, John Michael. "Secure and efficient wireless networks." Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2006. http://wwwlib.umi.com/cr/ucsd/fullcit?p3220376.

Full text
Abstract:
Thesis (Ph. D.)--University of California, San Diego, 2006.<br>Title from first page of PDF file (viewed September 8, 2006). Available via ProQuest Digital Dissertations. Vita. Includes bibliographical references (p. 99-103).
APA, Harvard, Vancouver, ISO, and other styles
7

Friji, Hamdi. "Graph neural network-based intrusion detection for secure edge networks." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAS030.

Full text
Abstract:
Face à l'escalade de la complexité et à la fréquence des cyberattaques, cette thèse propose des approches innovantes pour la détection d'intrusion dans les réseaux, en exploitant les capacités avancées des réseaux de neurones en graphe (Graph Neural Networks, GNNs) et de nouvelles représentations sous forme de graphes. Nous commençons par une analyse critique des jeux de données et des représentations de réseaux actuels, en abordant des questions clés sur leur efficacité. Nous introduisons une nouvelle représentation des flux de communication sous forme de graphes, offrant une plus grande robu
APA, Harvard, Vancouver, ISO, and other styles
8

Nawaz, Omer. "Secure Identification in Social Wireless Networks." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4042.

Full text
Abstract:
The applications based on social networking have brought revolution towards social life and are continuously gaining popularity among the Internet users. Due to the advanced computational resources offered by the innovative hardware and nominal subscriber charges of network operators, most of the online social networks are transforming into the mobile domain by offering exciting applications and games exclusively designed for users on the go. Moreover, the mobile devices are considered more personal as compared to their desktop rivals, so there is a tendency among the mobile users to store sen
APA, Harvard, Vancouver, ISO, and other styles
9

Mirzadeh, Shahab. "Secure key management for personal networks." Thesis, University of Surrey, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.543916.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mehta, Haripriya(Haripriya P. ). "Secure inference of quantized neural networks." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/127663.

Full text
Abstract:
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, May, 2020<br>Cataloged from the official PDF of thesis.<br>Includes bibliographical references (pages 63-65).<br>Running image recognition algorithms on medical datasets raises several privacy concerns. Hospitals may not have access to an image recognition model that a third party may have developed, and medical images are HIPAA protected and thus, cannot leave hospital servers. However, with secure neural network inference, hospitals can send encrypted medical images as input to
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Secure Networks"

1

Preneel, Bart, ed. Secure Information Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Conti, Mauro. Secure Wireless Sensor Networks. Springer New York, 2015. http://dx.doi.org/10.1007/978-1-4939-3460-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jayakody, Dushantha Nalin K., Kathiravan Srinivasan, and Vishal Sharma, eds. 5G Enabled Secure Wireless Networks. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-03508-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Raymond, Greenlaw, ed. Secure roaming in 802.11 networks. Newnes, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bukowski, Lech. Reliable, Secure and Resilient Logistics Networks. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-00850-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Khan, Jahanzeb. Building Secure Wireless Networks with 802.11. John Wiley & Sons, Ltd., 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Anis, Khwaja, ed. Building secure wireless networks with 802.11. Wiley Pub., 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Purser, Michael. Secure data networking. Artech House, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Larry, Caffrey, Okot-Uma Rogers W'O, Commonwealth Secretariat, Commonwealth Network of Information Technology for Development., and International Council for Information Technology in Government Administration., eds. Government secure intranets. Commonwealth Secretariat, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Velliangiri, S., M. Gunasekaran, and P. Karthikeyan, eds. Secure Communication for 5G and IoT Networks. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-79766-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Secure Networks"

1

Shen, Yulong, Yuanyu Zhang, and Xiaohong Jiang. "Secure Routing." In Wireless Networks. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-38465-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hicks, Michael, and Angelos D. Keromytis. "A Secure Plan." In Active Networks. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-540-48507-0_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Herrigel, Alexander, and Xuejia Lai. "Secure IN internetworking." In Intelligent Networks. Springer US, 1995. http://dx.doi.org/10.1007/978-0-387-34894-0_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Luo, Ming-Xing. "Secure Quantum Cloud Computing." In Quantum Networks. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-6226-2_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shen, Yulong, Yuanyu Zhang, and Xiaohong Jiang. "Physical Layer Secure Communications." In Wireless Networks. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-38465-3_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Karanastasis, Stelios, and Ahmed Patel. "Security on ATM Networks." In Secure Information Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Markantonakis, Constantinos, and Simeon Xenitellis. "Implementing a Secure Log File Download Manager for the Java Card." In Secure Information Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Oppliger, Rolf. "Protecting Key Exchange and Management Protocols Against Resource Clogging Attacks." In Secure Information Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Adamson, W. A., C. J. Antonelli, K. W. Coffman, P. McDaniel, and J. Rees. "Secure Distributed Virtual Conferencing." In Secure Information Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hardjono, Thomas, and Brad Cain. "PIM-SM Security: Interdomain Issues and Solutions." In Secure Information Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Secure Networks"

1

Mas Machuca, Carmen. "Planning Strategy Towards Secure Optical Core Networks." In Photonic Networks and Devices. Optica Publishing Group, 2024. https://doi.org/10.1364/networks.2024.nem1c.4.

Full text
Abstract:
Network operators are considering the increase of the data transmission security by the use of QKD devices. We present best planning strategies to reduce the required investments while maximizing the key capacity. Full-text article not available; see video presentation
APA, Harvard, Vancouver, ISO, and other styles
2

Sulimany, Kfir, Sri Krishna Vadlamani, Ryan Hamerly, Prahlad Iyengar, and Dirk Englund. "Quantum-Secure Deep Learning in Optical Networks." In Optical Fiber Communication Conference. Optica Publishing Group, 2025. https://doi.org/10.1364/ofc.2025.m4e.6.

Full text
Abstract:
The demand for cloud-based deep learning has intensified the need for secure computation. Our quantum-secure deep learning protocol leverages quantum properties of light and telecommunication components for scalable, secure cloud-based deep learning in optical networks.
APA, Harvard, Vancouver, ISO, and other styles
3

Rahman, Mohammad Saidur, Stephen DiAdamo, Miralem Mehic, and Charles Fleming. "Quantum Secure Anonymous Communication Networks." In 2024 International Conference on Quantum Communications, Networking, and Computing (QCNC). IEEE, 2024. http://dx.doi.org/10.1109/qcnc62729.2024.00060.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bolgouras, Vaios, Aristeidis Farao, and Christos Xenakis. "Roadmap to Secure 6G Networks." In 2024 IEEE 29th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). IEEE, 2024. https://doi.org/10.1109/camad62243.2024.10942738.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gharib, Dr Mohammed. "How to Secure Cooperative UAV Networks?" In 2024 5th CPSSI International Symposium on Cyber-Physical Systems (Applications and Theory) (CPSAT). IEEE, 2024. http://dx.doi.org/10.1109/cpsat64082.2024.10745417.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sanghani, Parth, Sharada Valiveti, and Gaurang Raval. "Secure Data Flow Between Trusted Networks." In 2024 9th International Conference on Communication and Electronics Systems (ICCES). IEEE, 2024. https://doi.org/10.1109/icces63552.2024.10859796.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fan-Yuan, Guan-Jie. "High-secure quantum communication and networks." In 2024 IEEE Opto-Electronics and Communications Conference (OECC). IEEE, 2024. https://doi.org/10.1109/oecc54135.2024.10975607.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fioravanti, Camilla, Ernesto Del Prete, and Roberto Setola. "Secure Gossip Algorithm for Industrial Networks." In 2025 33rd Mediterranean Conference on Control and Automation (MED). IEEE, 2025. https://doi.org/10.1109/med64031.2025.11073443.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

BA, Usha, and Aruna S. "Secure Decentralized File Sharing." In 2024 4th International Conference on Mobile Networks and Wireless Communications (ICMNWC). IEEE, 2024. https://doi.org/10.1109/icmnwc63764.2024.10872313.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ellis, Todd. "Security As a Service for Rail Applications." In 2020 Joint Rail Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/jrc2020-8027.

Full text
Abstract:
Abstract State-of-the-art rail systems require reliant, redundant and critical and secure communications. Data integrity is paramount when considering the criticality that the data payload remains secure for 24/7 year-round applications. With technologies such as Communications Based Train Control (CBTC) and Positive Train Control (PTC) being implemented, considerations for data integrity in these networks must include methods to avoid internal and external vulnerabilities. Unlike traditional encryption methodologies, newer techniques involve tunneling payloads across open or closed networks;
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Secure Networks"

1

Pasupuleti, Murali Krishna. Scalable Quantum Networks: Entanglement-Driven Secure Communication. National Education Services, 2025. https://doi.org/10.62311/nesx/rrvi525.

Full text
Abstract:
Abstract: Scalable quantum networks, powered by entanglement-driven secure communication, are poised to revolutionize global information exchange, cybersecurity, and quantum computing infrastructures. Unlike classical communication systems, quantum networks leverage quantum entanglement and superposition to enable ultra-secure data transmission, quantum key distribution (QKD), and instantaneous information sharing across large-scale networks. This research explores the fundamental principles of entanglement-based communication, the role of quantum repeaters, quantum memory, and multi-nodal ent
APA, Harvard, Vancouver, ISO, and other styles
2

Pasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.

Full text
Abstract:
Abstract: As quantum computing and quantum communication technologies advance, securing quantum networks against emerging cyber threats has become a critical challenge. Traditional cryptographic methods are vulnerable to quantum attacks, necessitating the development of AI-driven security solutions. This research explores the integration of machine learning (ML) algorithms with quantum cryptographic frameworks to enhance Quantum Key Distribution (QKD), post-quantum cryptography (PQC), and real-time threat detection. AI-powered quantum security mechanisms, including neural network-based quantum
APA, Harvard, Vancouver, ISO, and other styles
3

Ravishankar, Chinya V., Srikanth Krishnamurthy, Michalis Faloutsos, and Satish Tripathi. Secure Wireless Fault Tolerant Tunable Networks (SWIFT). Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada437661.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Popkov, G. V. Algorithms for designing secure multiservice communication networks. Ailamazyan Program Systems Institute of Russian Academy of Sciences, 2023. http://dx.doi.org/10.12731/ofernio.2023.25165.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Clark, Paul C., Timothy E. Lavin, Cynthia E. Irvine, and David J. Shifflett. DNS and Multilevel Secure Networks: Architectures and Recommendations. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada498511.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Donggang. Secure and Robust Clustering in Wireless Sensor Networks. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada500585.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Datko, Joshua B. Supporting Secure, AD HOC Joins for Tactical Networks. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada403488.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Peterson, Larry, Randy Wang, and Vivek Pai. Building Secure and Reliable Networks Through Robust Resource Scheduling. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada436189.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Meseguer, Jose, and Carolyn Talcott. Maude: A Wide Spectrum Language for Secure Active Networks. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada406892.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Allende López, Marcos, Diego López, Sergio Cerón, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, 2021. http://dx.doi.org/10.18235/0003313.

Full text
Abstract:
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Cambridge Quantum Computing (CQC), and Tecnológico de Monterrey to identify and eliminate quantum threats in blockchain networks. The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms. When quantum computers become robust enough to run Shor's algorithm on a large scale, the most used asymmetric algorithms, utilized for digital signatures and message encryption, such as RSA, (EC)DSA, and (EC)DH
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!