Sumaia Ali Alal

Sumaia Ali Alal

مطالب
ترتیب بر اساس: جدیدترینپربازدیدترین

فیلترهای جستجو: فیلتری انتخاب نشده است.
نمایش ۱ تا ۲ مورد از کل ۲ مورد.
۱.

Blockchain Beyond Cryptocurrency: Emerging Applications in Secure Data Sharing(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Blockchain Secure Data Sharing Decentralization Data Integrity cryptocurrency Healthcare Finance Supply Chain Management immutability Scalability

حوزه‌های تخصصی:
تعداد بازدید : ۴ تعداد دانلود : ۳
Background: Blockchain, mainly known for supporting cryptocurrencies, has a much broader role, as seen in this paper. These fundamental features of decentralization and immutability guarantee improved security and transparency in multiple spheres of human life. Objective: The article seeks to review current literature on new prospects of using blockchain as a secure way of sharing data with the purpose of establishing its advantages and disadvantages in this field. Methods: Relevant academic articles and papers published in the last 5 years were considered, and research cases of blockchain applications in numerous fields including healthcare, finance, supply chain, etc. This incorporates a review of blockchain within the capacity of data integrity, confidentiality, and availability. Results: The results show that blockchain can greatly improve the security and credibility of data in data sharing by reducing common vulnerability and offering reliable traceability. The technology ensures safe transactions of data and minimizes the possibilities of manipulation of data in fields which involve sensitive data processes. Conclusion: Opportunities for the blockchain for secure data sharing are demonstrated across several industries through current advancements. However, it also has limitations that includes size ability, compatibility and legislation issues which still has to be solved. The study should therefore consider the following recommendations about the barriers outlined above in order to enhance the application of blockchain in secure data sharing in the future.
۲.

Cybersecurity in the Age of Quantum Computing New Challenges and Solutions(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Quantum Key Distribution 5G networks Cryptographic Resilience Network Security Hybrid QKD Optical Backbone Wireless Topologies Standardization Key Generation Rate Cybersecurity

حوزه‌های تخصصی:
تعداد بازدید : ۵ تعداد دانلود : ۳
Background: Mobile networks today specifically 5G require appreciable secure networks because of the emerging risks due to the growth in the deployment of network structures. Discovered weaknesses of cryptographic conventional methods to quantum computing breakthroughs make it necessary to develop quantum-resistant solutions. Objective: The article analysing Quantum Key Distribution (QKD) protocols in improving cryptographic performance in 5G networking environment, with emphasis on incorporating QKD into 5G network designs. Methods: The study performed both a systematic literature review and an evaluation of current QKD deployments, as well as a qualitative assessment of data derived from 20 key informant interviews on QKD in telecommunications and 15 technical reports. Latency and key generation rate experiments were both conducted with relay mechanisms including both trusted and untrusted optical fiber and wireless relay links, in addition to integration issues were explored using simulations over fiber and wireless emulated networks. Results: The outcomes emphasise that QKD brings radically enhanced key security in conjunction with low delay and high rate within integrated 5G architectures. Hybrid relay-based QKD augmented key generation rates by 23 % in comparison with previous techniques. There are also concerns associated with the implementation of internationally agreed on standards which include issues pertaining to non-compliance of the standards used in different countries and high costs involved when trying to implement these standards. Conclusion: QKD implementation also increases cryptographic protection of the 5G networks and makes infrastructures quantum-immune to threats originating from the quantum-age. To make it more widespread, additional standardization and a reduction in cost are required.

پالایش نتایج جستجو

تعداد نتایج در یک صفحه:

درجه علمی

مجله

سال

حوزه تخصصی

زبان