Showing 41 - 60 results of 836 for search '(( Computer networks Security features. ) OR ( Computer network Security features. ))*', query time: 0.22s Refine Results
  1. 41
  2. 42
  3. 43
  4. 44
  5. 45
  6. 46
  7. 47
  8. 48

    Neuro-Driven Agent-Based Security for Quantum-Safe 6G Networks by Mohammed Alwakeel

    Published 2025-06-01
    “…Around the same time that 6G networks will be launched, advances in quantum computing could challenge existing cryptographic security. …”
    Get full text
    Article
  9. 49
  10. 50
  11. 51
  12. 52

    TSRF: A Trust-Aware Secure Routing Framework in Wireless Sensor Networks by Junqi Duan, Dong Yang, Haoqing Zhu, Sidong Zhang, Jing Zhao

    Published 2014-01-01
    “…In recent years, trust-aware routing protocol plays a vital role in security of wireless sensor networks (WSNs), which is one of the most popular network technologies for smart city. …”
    Get full text
    Article
  13. 53
  14. 54
  15. 55

    CAA-RF: An Anomaly Detection Algorithm for Computing Power Blockchain Networks by Shifeng Jia, Yating Zhao, Yang Zhang, Bin Jia, Wenjuan Lian

    Published 2025-05-01
    “…As a distributed communication and storage system, blockchain forms a Computing Power Blockchain Network (CPBN) by integrating computing nodes and network resources. …”
    Get full text
    Article
  16. 56
  17. 57

    Securing Unmanned Aerial Vehicles Networks Using Pairing Free Aggregate Signcryption Scheme by Eman Abouelkheir

    Published 2024-01-01
    “…Multiple groups of UAVs, through appropriate interaction and concerted procedures, can achieve these objectives. The unpredictable features of UAVs and their reliance on unprotected and widely available wireless networks create challenges in establishing secure communication between a private edge cloud and a UAV. …”
    Get full text
    Article
  18. 58

    Secure and efficient cloudlet networks: blockchain integration with agent-based proof of trust mechanism by Nothile C. Masango, Jeffrey O. Agushaka, Mercy C. Amaefule, Olutosin Taiwo, Peiying Zhang, Absalom E. Ezugwu, Kashif Saleem, Aseel Smerat, Laith Abualigah

    Published 2025-03-01
    “…Experimental results demonstrate that this solution significantly enhances security, mitigates latency, and improves network performance compared to existing methods. …”
    Get full text
    Article
  19. 59
  20. 60